General
-
Target
fb919bf6f7c5e7e32fa014c61e370c0364ef994676aa1c718484132fbae42a6d
-
Size
978KB
-
Sample
230304-nzmhssdh85
-
MD5
74f593e589caab7b443c3a88d10ec12a
-
SHA1
9bf4e194c9561122b3a3874a2c2fcd85e4188bd0
-
SHA256
fb919bf6f7c5e7e32fa014c61e370c0364ef994676aa1c718484132fbae42a6d
-
SHA512
077ae94809595e7760e10d5bda0e993ee1ce19462ee202e8184cf87beeb608180e016750159239133faaadb84ee1e961f91593817b5b4226a511d9a3a869011e
-
SSDEEP
24576:DyRVWfL8J/cVw4LNn1rA9Z/nq7e5urmW:WRkfkCXrs/nq7Iurm
Static task
static1
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
fb919bf6f7c5e7e32fa014c61e370c0364ef994676aa1c718484132fbae42a6d
-
Size
978KB
-
MD5
74f593e589caab7b443c3a88d10ec12a
-
SHA1
9bf4e194c9561122b3a3874a2c2fcd85e4188bd0
-
SHA256
fb919bf6f7c5e7e32fa014c61e370c0364ef994676aa1c718484132fbae42a6d
-
SHA512
077ae94809595e7760e10d5bda0e993ee1ce19462ee202e8184cf87beeb608180e016750159239133faaadb84ee1e961f91593817b5b4226a511d9a3a869011e
-
SSDEEP
24576:DyRVWfL8J/cVw4LNn1rA9Z/nq7e5urmW:WRkfkCXrs/nq7Iurm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-