General
-
Target
e209160e114f3c070fad380ae80d14cf54df07bd87a76d25bef6acd6cd28e7da
-
Size
690KB
-
Sample
230306-p9vgtsbg7z
-
MD5
685892f0391efcb106812fc9514f3cac
-
SHA1
f9b230503f2a4d40c86c67a3358c3154558970ef
-
SHA256
e209160e114f3c070fad380ae80d14cf54df07bd87a76d25bef6acd6cd28e7da
-
SHA512
ec48a7a23e9b5d88123f678ed654f92f5e6cb24ce15068079d6e10d4fd78ac663e56c8a3da55f58e0493db59718acacc55118bf7b262fc7f4136a9709b9c20be
-
SSDEEP
12288:EMrry90Jmnq2L3I7uGSqsZyspjhxxtfsPr9hBxzPseKTB56r:nyfqwI7UnvfAZVUPL6r
Static task
static1
Behavioral task
behavioral1
Sample
e209160e114f3c070fad380ae80d14cf54df07bd87a76d25bef6acd6cd28e7da.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
e209160e114f3c070fad380ae80d14cf54df07bd87a76d25bef6acd6cd28e7da
-
Size
690KB
-
MD5
685892f0391efcb106812fc9514f3cac
-
SHA1
f9b230503f2a4d40c86c67a3358c3154558970ef
-
SHA256
e209160e114f3c070fad380ae80d14cf54df07bd87a76d25bef6acd6cd28e7da
-
SHA512
ec48a7a23e9b5d88123f678ed654f92f5e6cb24ce15068079d6e10d4fd78ac663e56c8a3da55f58e0493db59718acacc55118bf7b262fc7f4136a9709b9c20be
-
SSDEEP
12288:EMrry90Jmnq2L3I7uGSqsZyspjhxxtfsPr9hBxzPseKTB56r:nyfqwI7UnvfAZVUPL6r
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-