General
-
Target
40620c4343d576ce31b3808658a8c1e5f7519237a0fc04cb9f3556e46604e05b
-
Size
856KB
-
Sample
230303-nde7lagf8y
-
MD5
bbda1b2afb5bf339be07cc9c9fb1a406
-
SHA1
a62838f887e3e3a16ec191849a19ba2e2dcd8467
-
SHA256
40620c4343d576ce31b3808658a8c1e5f7519237a0fc04cb9f3556e46604e05b
-
SHA512
4f2e0a09c226e9bc9112ebf3e8a00650a39283c6ed2710510d0b3bb878b10c19ad81c99c59ab81e74ffc5d744c66eefdcc590408560342af7a4abe764dc81734
-
SSDEEP
24576:jywL0bJW7Bt03ma5LdtBaIyWNSJI2kPM0:2wLwJQYmSLdfl8JIM
Static task
static1
Behavioral task
behavioral1
Sample
40620c4343d576ce31b3808658a8c1e5f7519237a0fc04cb9f3556e46604e05b.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Targets
-
-
Target
40620c4343d576ce31b3808658a8c1e5f7519237a0fc04cb9f3556e46604e05b
-
Size
856KB
-
MD5
bbda1b2afb5bf339be07cc9c9fb1a406
-
SHA1
a62838f887e3e3a16ec191849a19ba2e2dcd8467
-
SHA256
40620c4343d576ce31b3808658a8c1e5f7519237a0fc04cb9f3556e46604e05b
-
SHA512
4f2e0a09c226e9bc9112ebf3e8a00650a39283c6ed2710510d0b3bb878b10c19ad81c99c59ab81e74ffc5d744c66eefdcc590408560342af7a4abe764dc81734
-
SSDEEP
24576:jywL0bJW7Bt03ma5LdtBaIyWNSJI2kPM0:2wLwJQYmSLdfl8JIM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-