General
-
Target
34532f862c001878203a4c5f8f2b7efa5c47084ebaf7ca26d906099d753e2471
-
Size
891KB
-
Sample
230303-bbmgnsff39
-
MD5
e322c1b3f19ed48d5ee29c56c6409f6e
-
SHA1
4f9d68de3888e8576d194d78246ca68e00850675
-
SHA256
34532f862c001878203a4c5f8f2b7efa5c47084ebaf7ca26d906099d753e2471
-
SHA512
d82c35c9b0632249c90b8c1af030356ff664e53b854ae7ef8c6e254b764553ea913449d001be320e9e37ba0a736366d5909e038b29db18595553f8d73f35b5a5
-
SSDEEP
24576:PyxiP+XdtCYEdiaa8VTYXQqas+XjhOENVDLyx:a5dtCYEza8Vfqas+Xdt
Static task
static1
Behavioral task
behavioral1
Sample
34532f862c001878203a4c5f8f2b7efa5c47084ebaf7ca26d906099d753e2471.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Targets
-
-
Target
34532f862c001878203a4c5f8f2b7efa5c47084ebaf7ca26d906099d753e2471
-
Size
891KB
-
MD5
e322c1b3f19ed48d5ee29c56c6409f6e
-
SHA1
4f9d68de3888e8576d194d78246ca68e00850675
-
SHA256
34532f862c001878203a4c5f8f2b7efa5c47084ebaf7ca26d906099d753e2471
-
SHA512
d82c35c9b0632249c90b8c1af030356ff664e53b854ae7ef8c6e254b764553ea913449d001be320e9e37ba0a736366d5909e038b29db18595553f8d73f35b5a5
-
SSDEEP
24576:PyxiP+XdtCYEdiaa8VTYXQqas+XjhOENVDLyx:a5dtCYEza8Vfqas+Xdt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-