General
-
Target
967bed4f1855ab443241e4d040da8132bf4c34fb1835f178df1110d814268076
-
Size
873KB
-
Sample
230303-scbj8shd4y
-
MD5
4234b1d0c4bf685b23b2a33661d6eac6
-
SHA1
c367c415f8a88977ddcdf89ddabb371695544ebb
-
SHA256
967bed4f1855ab443241e4d040da8132bf4c34fb1835f178df1110d814268076
-
SHA512
e3554d09ae3daaf9a4181dd401d3f994960886ef5ca996d5ec8ed8f65ab6dee4a103fffe0518dfaf6aedcfc6c677ebff279bdfa0b46d8c51dc33388afaf6a905
-
SSDEEP
24576:fyFL04dmMTzJ+G7bGNU/jcESBYdCAg63IFQOD:qGWmgzJh7zSBdq3mQ
Static task
static1
Behavioral task
behavioral1
Sample
967bed4f1855ab443241e4d040da8132bf4c34fb1835f178df1110d814268076.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Targets
-
-
Target
967bed4f1855ab443241e4d040da8132bf4c34fb1835f178df1110d814268076
-
Size
873KB
-
MD5
4234b1d0c4bf685b23b2a33661d6eac6
-
SHA1
c367c415f8a88977ddcdf89ddabb371695544ebb
-
SHA256
967bed4f1855ab443241e4d040da8132bf4c34fb1835f178df1110d814268076
-
SHA512
e3554d09ae3daaf9a4181dd401d3f994960886ef5ca996d5ec8ed8f65ab6dee4a103fffe0518dfaf6aedcfc6c677ebff279bdfa0b46d8c51dc33388afaf6a905
-
SSDEEP
24576:fyFL04dmMTzJ+G7bGNU/jcESBYdCAg63IFQOD:qGWmgzJh7zSBdq3mQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-