General
-
Target
b83d700bd968196432dec1fbda13f8fd706e1a20e7adf7a688bd492e4f025e26
-
Size
691KB
-
Sample
230306-wqvf2see26
-
MD5
0797ea9fedd2be3c4ce1d522e6f6ed17
-
SHA1
0d2d93cba0b202d55ac8b872d91452e2caa4241e
-
SHA256
b83d700bd968196432dec1fbda13f8fd706e1a20e7adf7a688bd492e4f025e26
-
SHA512
f5b6bbf442653c85e557a2215de56f2f110e87087ba8bce582b85a0b8be0b6cb50efd7c616f88f05f4417118284229d44590783d8edec20b069f8a4e085ca2a7
-
SSDEEP
12288:ZMrOy90mETVNLTWXkKv+HktkK2AL1zMpawbcMaGDP2Z1XfqZFQvy0bl:7ypeVRtKv+bUzMpqG72Z1CZFUNJ
Static task
static1
Behavioral task
behavioral1
Sample
b83d700bd968196432dec1fbda13f8fd706e1a20e7adf7a688bd492e4f025e26.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
b83d700bd968196432dec1fbda13f8fd706e1a20e7adf7a688bd492e4f025e26
-
Size
691KB
-
MD5
0797ea9fedd2be3c4ce1d522e6f6ed17
-
SHA1
0d2d93cba0b202d55ac8b872d91452e2caa4241e
-
SHA256
b83d700bd968196432dec1fbda13f8fd706e1a20e7adf7a688bd492e4f025e26
-
SHA512
f5b6bbf442653c85e557a2215de56f2f110e87087ba8bce582b85a0b8be0b6cb50efd7c616f88f05f4417118284229d44590783d8edec20b069f8a4e085ca2a7
-
SSDEEP
12288:ZMrOy90mETVNLTWXkKv+HktkK2AL1zMpawbcMaGDP2Z1XfqZFQvy0bl:7ypeVRtKv+bUzMpqG72Z1CZFUNJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-