General
-
Target
8de55f21898f5209b71034c28d64d4c7f77b38fd4219daf259e67d214ce69da0
-
Size
873KB
-
Sample
230303-svdsbahe5y
-
MD5
dad20f4aaf773a28df646aca2cb9c70f
-
SHA1
3474157cf52584e43b8fc64f1d38641c495de3f6
-
SHA256
8de55f21898f5209b71034c28d64d4c7f77b38fd4219daf259e67d214ce69da0
-
SHA512
f231f5419f161a13937c98f978f3737d8eef0da1f84d3acc318a27cc56bd04b4e07bd19f4c5cd494930dc569c6193fd756a93dcaf39fef6ceccbb52b2e638070
-
SSDEEP
24576:Ty8VCMCAliwQa94s+h+Lw0htYy/gcTG7702tI0:m8ozAU8qsf/hTG302tI
Static task
static1
Behavioral task
behavioral1
Sample
8de55f21898f5209b71034c28d64d4c7f77b38fd4219daf259e67d214ce69da0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Targets
-
-
Target
8de55f21898f5209b71034c28d64d4c7f77b38fd4219daf259e67d214ce69da0
-
Size
873KB
-
MD5
dad20f4aaf773a28df646aca2cb9c70f
-
SHA1
3474157cf52584e43b8fc64f1d38641c495de3f6
-
SHA256
8de55f21898f5209b71034c28d64d4c7f77b38fd4219daf259e67d214ce69da0
-
SHA512
f231f5419f161a13937c98f978f3737d8eef0da1f84d3acc318a27cc56bd04b4e07bd19f4c5cd494930dc569c6193fd756a93dcaf39fef6ceccbb52b2e638070
-
SSDEEP
24576:Ty8VCMCAliwQa94s+h+Lw0htYy/gcTG7702tI0:m8ozAU8qsf/hTG302tI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-