General
-
Target
3dc1c1de83ddd291986d507f56617268e817d1057b2bbbef664568d2aa644d6c
-
Size
857KB
-
Sample
230303-hj4jgsga2w
-
MD5
5933d10c7dcf3adcbb803b1d4316c1e7
-
SHA1
25ba5a31fc5eff7a6bb7e6931277d33c05054811
-
SHA256
3dc1c1de83ddd291986d507f56617268e817d1057b2bbbef664568d2aa644d6c
-
SHA512
d46363d0c9dbc6a9742340d51016564f1cbda810cddc444017e6497098c166ff7f44dd921f37d8587b8a89ce69fee71c8cc1a78217d5aac7da7915ac1ca6400e
-
SSDEEP
24576:FymUzrQPpgYht1TcFWalCy35C4ejP7nuD3fiztWeu:gmUzof1TcpCYgWrit
Static task
static1
Behavioral task
behavioral1
Sample
3dc1c1de83ddd291986d507f56617268e817d1057b2bbbef664568d2aa644d6c.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Targets
-
-
Target
3dc1c1de83ddd291986d507f56617268e817d1057b2bbbef664568d2aa644d6c
-
Size
857KB
-
MD5
5933d10c7dcf3adcbb803b1d4316c1e7
-
SHA1
25ba5a31fc5eff7a6bb7e6931277d33c05054811
-
SHA256
3dc1c1de83ddd291986d507f56617268e817d1057b2bbbef664568d2aa644d6c
-
SHA512
d46363d0c9dbc6a9742340d51016564f1cbda810cddc444017e6497098c166ff7f44dd921f37d8587b8a89ce69fee71c8cc1a78217d5aac7da7915ac1ca6400e
-
SSDEEP
24576:FymUzrQPpgYht1TcFWalCy35C4ejP7nuD3fiztWeu:gmUzof1TcpCYgWrit
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-