General
-
Target
31f50bc43236117daac2ce14066a2e0b3dc8b07e340ce042a0d609fcf76c6653
-
Size
873KB
-
Sample
230303-s6lx3aab52
-
MD5
d8717f652ec6e5a3b75f574f8897b0be
-
SHA1
9824b79e01889a8a87dd4a96fc9a28feb3b9d0d8
-
SHA256
31f50bc43236117daac2ce14066a2e0b3dc8b07e340ce042a0d609fcf76c6653
-
SHA512
845c7eca9b7a10d4d220c73e3661e186a2ab5dfee116119e482f14799296d9ce9d863151a51d5f3cd8b1467e8b881ba9a2c04db3cf092b44fdef1af9de1bd647
-
SSDEEP
24576:1ys3x6mtZY7b3ycz97BFb0Nh/EcqS+68z0IPjc:Qs3x6IZYic7BFb3S+rz0
Static task
static1
Behavioral task
behavioral1
Sample
31f50bc43236117daac2ce14066a2e0b3dc8b07e340ce042a0d609fcf76c6653.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Targets
-
-
Target
31f50bc43236117daac2ce14066a2e0b3dc8b07e340ce042a0d609fcf76c6653
-
Size
873KB
-
MD5
d8717f652ec6e5a3b75f574f8897b0be
-
SHA1
9824b79e01889a8a87dd4a96fc9a28feb3b9d0d8
-
SHA256
31f50bc43236117daac2ce14066a2e0b3dc8b07e340ce042a0d609fcf76c6653
-
SHA512
845c7eca9b7a10d4d220c73e3661e186a2ab5dfee116119e482f14799296d9ce9d863151a51d5f3cd8b1467e8b881ba9a2c04db3cf092b44fdef1af9de1bd647
-
SSDEEP
24576:1ys3x6mtZY7b3ycz97BFb0Nh/EcqS+68z0IPjc:Qs3x6IZYic7BFb3S+rz0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-