General
-
Target
7214a52a0106c9bfb1e7c69516eb51ee96f67990501dd9de1a5dee9770670e70
-
Size
690KB
-
Sample
230306-pw91csbf9t
-
MD5
ae6e74bcbdce4922e552d6c6b193fa44
-
SHA1
d060f11e20db10aded493576175b22a5e57d6b08
-
SHA256
7214a52a0106c9bfb1e7c69516eb51ee96f67990501dd9de1a5dee9770670e70
-
SHA512
4a5548363b89fcfb5e27a8ad19f580a3a59281303259509722faaf9187f1baea4de8e9828c5fc69a93835fbeb7a7963ddba926920ae2509c9120f795f6981861
-
SSDEEP
12288:CMrSy90rAjQa0FG9yiJ8kIgrwwECSDGxLHqthexBtqA09ABmlQ79cWQtyRgvP92q:0ypr0F03J8YwZ3D8HN7tRXmG7yMgvP9/
Static task
static1
Behavioral task
behavioral1
Sample
7214a52a0106c9bfb1e7c69516eb51ee96f67990501dd9de1a5dee9770670e70.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
7214a52a0106c9bfb1e7c69516eb51ee96f67990501dd9de1a5dee9770670e70
-
Size
690KB
-
MD5
ae6e74bcbdce4922e552d6c6b193fa44
-
SHA1
d060f11e20db10aded493576175b22a5e57d6b08
-
SHA256
7214a52a0106c9bfb1e7c69516eb51ee96f67990501dd9de1a5dee9770670e70
-
SHA512
4a5548363b89fcfb5e27a8ad19f580a3a59281303259509722faaf9187f1baea4de8e9828c5fc69a93835fbeb7a7963ddba926920ae2509c9120f795f6981861
-
SSDEEP
12288:CMrSy90rAjQa0FG9yiJ8kIgrwwECSDGxLHqthexBtqA09ABmlQ79cWQtyRgvP92q:0ypr0F03J8YwZ3D8HN7tRXmG7yMgvP9/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-