General
-
Target
9e4ce12cad72c0961669d35c0e00e78cba977dad7b6952727316558d8d7b3420
-
Size
986KB
-
Sample
230304-ewm6gscf69
-
MD5
569e817cd92e64a9bd11b93c7ab73545
-
SHA1
dd7ea97104cf8d997ff453e5c4ae3b7ec14a5bcb
-
SHA256
9e4ce12cad72c0961669d35c0e00e78cba977dad7b6952727316558d8d7b3420
-
SHA512
127d5002c1b8318650f35acf227c44de5b6a509ddf50bbf7bab9d9708e73df248392ffb525ca5c2e93fa988eeecf81aef4a5cbbe6827df5590e3bd477484e9a3
-
SSDEEP
24576:Ny4UlLjZb7AfKz6rtfXk0MxyNLr7akfVzDBLsybwn0fXfOQHv:odlLjhhz6rVXXws+YBLsD0fPH
Static task
static1
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
9e4ce12cad72c0961669d35c0e00e78cba977dad7b6952727316558d8d7b3420
-
Size
986KB
-
MD5
569e817cd92e64a9bd11b93c7ab73545
-
SHA1
dd7ea97104cf8d997ff453e5c4ae3b7ec14a5bcb
-
SHA256
9e4ce12cad72c0961669d35c0e00e78cba977dad7b6952727316558d8d7b3420
-
SHA512
127d5002c1b8318650f35acf227c44de5b6a509ddf50bbf7bab9d9708e73df248392ffb525ca5c2e93fa988eeecf81aef4a5cbbe6827df5590e3bd477484e9a3
-
SSDEEP
24576:Ny4UlLjZb7AfKz6rtfXk0MxyNLr7akfVzDBLsybwn0fXfOQHv:odlLjhhz6rVXXws+YBLsD0fPH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-