General
-
Target
27e3db92eda139138cd60c79c74acffdcf21410b02a7cf28561a758ef31dc448
-
Size
892KB
-
Sample
230303-fjwsjagc46
-
MD5
ce28295b4a8e8c8504ed7c70728eebbe
-
SHA1
68ab508667ccb6ce1c86ca395365d36fba0ba04a
-
SHA256
27e3db92eda139138cd60c79c74acffdcf21410b02a7cf28561a758ef31dc448
-
SHA512
8301b682beba08d2dd12a9b2fbbf301f242945b392d55a7c4949be9c2051bbc1dc9bdc66534250f7b3d467e294108c831762623c8251676d39642dfb085d56f1
-
SSDEEP
24576:9yFHb4irFKol59ugiY75a0KXgj0sOHXmaM/pY8j:YXFKo9uDoVKK0iV
Static task
static1
Behavioral task
behavioral1
Sample
27e3db92eda139138cd60c79c74acffdcf21410b02a7cf28561a758ef31dc448.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Targets
-
-
Target
27e3db92eda139138cd60c79c74acffdcf21410b02a7cf28561a758ef31dc448
-
Size
892KB
-
MD5
ce28295b4a8e8c8504ed7c70728eebbe
-
SHA1
68ab508667ccb6ce1c86ca395365d36fba0ba04a
-
SHA256
27e3db92eda139138cd60c79c74acffdcf21410b02a7cf28561a758ef31dc448
-
SHA512
8301b682beba08d2dd12a9b2fbbf301f242945b392d55a7c4949be9c2051bbc1dc9bdc66534250f7b3d467e294108c831762623c8251676d39642dfb085d56f1
-
SSDEEP
24576:9yFHb4irFKol59ugiY75a0KXgj0sOHXmaM/pY8j:YXFKo9uDoVKK0iV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-