General
-
Target
6f1b5358eb811f0fcca3b0ae1ca98e00601a813e39dd5314745c8fd9294a709d
-
Size
873KB
-
Sample
230303-sqgneaaa34
-
MD5
9f95aa653961e218f8421439d8359379
-
SHA1
434405388586351dbd97773158c626fde0dd6b6a
-
SHA256
6f1b5358eb811f0fcca3b0ae1ca98e00601a813e39dd5314745c8fd9294a709d
-
SHA512
f2350442f1e5e1f2749c84bf62b3661fccdee1bc661cf693664ce8df93de0580a8f0eff91c1f9c783a399a7100d4ae96a6ced6858b0ab01dac7d0838f64ae26f
-
SSDEEP
24576:8yyuYVsveYkbErkny2IZmXGa02aK/SwHXba:rxYyvp+y2IZ8Ga0aHXb
Static task
static1
Behavioral task
behavioral1
Sample
6f1b5358eb811f0fcca3b0ae1ca98e00601a813e39dd5314745c8fd9294a709d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Targets
-
-
Target
6f1b5358eb811f0fcca3b0ae1ca98e00601a813e39dd5314745c8fd9294a709d
-
Size
873KB
-
MD5
9f95aa653961e218f8421439d8359379
-
SHA1
434405388586351dbd97773158c626fde0dd6b6a
-
SHA256
6f1b5358eb811f0fcca3b0ae1ca98e00601a813e39dd5314745c8fd9294a709d
-
SHA512
f2350442f1e5e1f2749c84bf62b3661fccdee1bc661cf693664ce8df93de0580a8f0eff91c1f9c783a399a7100d4ae96a6ced6858b0ab01dac7d0838f64ae26f
-
SSDEEP
24576:8yyuYVsveYkbErkny2IZmXGa02aK/SwHXba:rxYyvp+y2IZ8Ga0aHXb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-