General
-
Target
223da823c3d6629fae7b71882ee93bac4a3170103527eabef5b69fdb3bd7cad8
-
Size
986KB
-
Sample
230304-d5cwfabh7z
-
MD5
1c09772f216f39ddb81b4b3c5dc70bac
-
SHA1
4843f04b7e2dec69e708497af8aed33dbf061a4b
-
SHA256
223da823c3d6629fae7b71882ee93bac4a3170103527eabef5b69fdb3bd7cad8
-
SHA512
12a8a356a98aab08c038fafe0691955f596bf78cefe561ff7bdcbe84c9ae091ef06303b469b53fa703ec15f7298d983af9c9c1624b5dab7a0ba75119170e10b4
-
SSDEEP
24576:TyPVrtNa/MzVzIBOnp+Pg7aDgIbA02Jf92bIU6:mPBPOMVgOnArEbR4d
Static task
static1
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
223da823c3d6629fae7b71882ee93bac4a3170103527eabef5b69fdb3bd7cad8
-
Size
986KB
-
MD5
1c09772f216f39ddb81b4b3c5dc70bac
-
SHA1
4843f04b7e2dec69e708497af8aed33dbf061a4b
-
SHA256
223da823c3d6629fae7b71882ee93bac4a3170103527eabef5b69fdb3bd7cad8
-
SHA512
12a8a356a98aab08c038fafe0691955f596bf78cefe561ff7bdcbe84c9ae091ef06303b469b53fa703ec15f7298d983af9c9c1624b5dab7a0ba75119170e10b4
-
SSDEEP
24576:TyPVrtNa/MzVzIBOnp+Pg7aDgIbA02Jf92bIU6:mPBPOMVgOnArEbR4d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-