General
-
Target
829c785618dbc042bd708b2aacf0dece.exe
-
Size
891KB
-
Sample
230303-jpt3nsgf48
-
MD5
829c785618dbc042bd708b2aacf0dece
-
SHA1
be67347f4ec90955a2b0e853840636293d7e2365
-
SHA256
9b1f4025ad6964df06bcc3496c274985c44c71d4dbdc5e15f51e9c92a2493c02
-
SHA512
645313ec486af7fab01285aba28c033497ef84283e5a1db884ebc9c56244d2c6276c403bd6e101b80214103437ecfb1bb41abbc2eba86c7f84a5964e2b7f06df
-
SSDEEP
24576:7yvMGb9/fB1PailSmrU/JWV5Zx70Qebrsc3Ml:ur3yiQmrU/OvPensn
Static task
static1
Behavioral task
behavioral1
Sample
829c785618dbc042bd708b2aacf0dece.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
829c785618dbc042bd708b2aacf0dece.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Targets
-
-
Target
829c785618dbc042bd708b2aacf0dece.exe
-
Size
891KB
-
MD5
829c785618dbc042bd708b2aacf0dece
-
SHA1
be67347f4ec90955a2b0e853840636293d7e2365
-
SHA256
9b1f4025ad6964df06bcc3496c274985c44c71d4dbdc5e15f51e9c92a2493c02
-
SHA512
645313ec486af7fab01285aba28c033497ef84283e5a1db884ebc9c56244d2c6276c403bd6e101b80214103437ecfb1bb41abbc2eba86c7f84a5964e2b7f06df
-
SSDEEP
24576:7yvMGb9/fB1PailSmrU/JWV5Zx70Qebrsc3Ml:ur3yiQmrU/OvPensn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-