General
-
Target
a1b0d4cbe3c240bc7874043cd51dbd925cf1abc45e35fb8c4e0499d0ccb2dbc7
-
Size
857KB
-
Sample
230303-khgpfagb9z
-
MD5
f4cd03a3249381566725606783c97d43
-
SHA1
ee9b022c60edb34c2ba767c297c9c71c12b79934
-
SHA256
a1b0d4cbe3c240bc7874043cd51dbd925cf1abc45e35fb8c4e0499d0ccb2dbc7
-
SHA512
6b5a4441939440877e1a6c1748b8a705d13bc6afbc3544c3ebb3244887dc3b304778bab37191b3e1a28390f13c5a32e4d2e9bf91c542903abeeda49b58f63329
-
SSDEEP
12288:zMrry90dBdvrsGnY2V956tWtfifjw5EMUk2njrRc9n+O3nU+/cP0w8j1g58G1/3f:cywBdvwOdVfA05Yk2jrenmFcjYR1/f
Static task
static1
Behavioral task
behavioral1
Sample
a1b0d4cbe3c240bc7874043cd51dbd925cf1abc45e35fb8c4e0499d0ccb2dbc7.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Targets
-
-
Target
a1b0d4cbe3c240bc7874043cd51dbd925cf1abc45e35fb8c4e0499d0ccb2dbc7
-
Size
857KB
-
MD5
f4cd03a3249381566725606783c97d43
-
SHA1
ee9b022c60edb34c2ba767c297c9c71c12b79934
-
SHA256
a1b0d4cbe3c240bc7874043cd51dbd925cf1abc45e35fb8c4e0499d0ccb2dbc7
-
SHA512
6b5a4441939440877e1a6c1748b8a705d13bc6afbc3544c3ebb3244887dc3b304778bab37191b3e1a28390f13c5a32e4d2e9bf91c542903abeeda49b58f63329
-
SSDEEP
12288:zMrry90dBdvrsGnY2V956tWtfifjw5EMUk2njrRc9n+O3nU+/cP0w8j1g58G1/3f:cywBdvwOdVfA05Yk2jrenmFcjYR1/f
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-