General
-
Target
00dbc89f85365cc4192dcea5268e03b7e80783df6e71e099e8da023f85cb6aba
-
Size
873KB
-
Sample
230303-s4ytvaab45
-
MD5
ce283093b98ea45c5feaf93193c4babf
-
SHA1
ccb871445caa00f6c0f86b703bf49ccf9fac7938
-
SHA256
00dbc89f85365cc4192dcea5268e03b7e80783df6e71e099e8da023f85cb6aba
-
SHA512
b250a21a1dbdd0f1b90a452360cf7ff679ff87fe2ade8359a23f698331f7caaa590338d6dd6ec308eb4638e0941bca373037af120c5da7b2d394493ed710fb20
-
SSDEEP
12288:GMrBy90VJha4LoclvPGjUGl5F5Iq4TrpyopD4d+Nlh/9se8SvMPJgdtkR:Hy8Jha9clqcPRyols+NL/miuJgdtkR
Static task
static1
Behavioral task
behavioral1
Sample
00dbc89f85365cc4192dcea5268e03b7e80783df6e71e099e8da023f85cb6aba.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Targets
-
-
Target
00dbc89f85365cc4192dcea5268e03b7e80783df6e71e099e8da023f85cb6aba
-
Size
873KB
-
MD5
ce283093b98ea45c5feaf93193c4babf
-
SHA1
ccb871445caa00f6c0f86b703bf49ccf9fac7938
-
SHA256
00dbc89f85365cc4192dcea5268e03b7e80783df6e71e099e8da023f85cb6aba
-
SHA512
b250a21a1dbdd0f1b90a452360cf7ff679ff87fe2ade8359a23f698331f7caaa590338d6dd6ec308eb4638e0941bca373037af120c5da7b2d394493ed710fb20
-
SSDEEP
12288:GMrBy90VJha4LoclvPGjUGl5F5Iq4TrpyopD4d+Nlh/9se8SvMPJgdtkR:Hy8Jha9clqcPRyols+NL/miuJgdtkR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-