General
-
Target
849467c22e3ffe0ef6c8a0976e94465b3782763a3878d6292e1356959fa10aaa
-
Size
986KB
-
Sample
230304-lbef6sch5x
-
MD5
e2e04a84ed4d9a03ff4ebbc86f81b086
-
SHA1
7a983cc943067c4fc032e59a0d8adc7471c5ebde
-
SHA256
849467c22e3ffe0ef6c8a0976e94465b3782763a3878d6292e1356959fa10aaa
-
SHA512
2a697fdc335193e98331d64aa5108d431acfb1a71057832a06321b49d39a24f0d8546b1a583d3204093a6376f08d34c534527451c750bb89d009f9a8e3bf878a
-
SSDEEP
24576:EysVDwq7XuEU85OpPMFzn5VIOzj9vyMZZC1ETYBt:TsVDwqd35eMFkY5yMzC1E
Static task
static1
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
849467c22e3ffe0ef6c8a0976e94465b3782763a3878d6292e1356959fa10aaa
-
Size
986KB
-
MD5
e2e04a84ed4d9a03ff4ebbc86f81b086
-
SHA1
7a983cc943067c4fc032e59a0d8adc7471c5ebde
-
SHA256
849467c22e3ffe0ef6c8a0976e94465b3782763a3878d6292e1356959fa10aaa
-
SHA512
2a697fdc335193e98331d64aa5108d431acfb1a71057832a06321b49d39a24f0d8546b1a583d3204093a6376f08d34c534527451c750bb89d009f9a8e3bf878a
-
SSDEEP
24576:EysVDwq7XuEU85OpPMFzn5VIOzj9vyMZZC1ETYBt:TsVDwqd35eMFkY5yMzC1E
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-