General
-
Target
0edce30ea91681466907df3cb6334efd.bin
-
Size
639KB
-
Sample
230308-bctmdacf6t
-
MD5
6b5ed144c93b7a2b02b2e697fb9681b0
-
SHA1
2ed3e616f4f3579b3acd039f107b76e3f2a908a4
-
SHA256
5e2d3c4c6090605a4a3d259650f187d86a07ad640cd9495f7b27d7d56a2593f2
-
SHA512
1ef0ba28d1644909a203aba442e0c349d488222f06eb9e2045786e3c19d11f4ae9f2e3b1beecc9b8ab7f62227fcc08b154e55be8f218c105b0a67532e6b94dfc
-
SSDEEP
12288:bPB+PdqTZIp2L3okXyunUa7ok87AzJDa90VS4OFd5mLKnGYBWYx5OIIznX4wdrYV:XacL4UnfzoaPIyL8HDd6/6V
Static task
static1
Behavioral task
behavioral1
Sample
b22c116ff5f7fbd7d3ccbea075c84eaba0cd1b3dce5effa9a284730a345c2b1c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b22c116ff5f7fbd7d3ccbea075c84eaba0cd1b3dce5effa9a284730a345c2b1c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
b22c116ff5f7fbd7d3ccbea075c84eaba0cd1b3dce5effa9a284730a345c2b1c.exe
-
Size
690KB
-
MD5
0edce30ea91681466907df3cb6334efd
-
SHA1
89589cf7142d1a5b9f78e1578c545cee1c224f77
-
SHA256
b22c116ff5f7fbd7d3ccbea075c84eaba0cd1b3dce5effa9a284730a345c2b1c
-
SHA512
dfbf9c6f0ed8d189d13f779d801001f4fef8651464430371f0c668ccf678fc7d605ed8d4bd7571fb9f52049ee1fe9d73c681bd222c4f1655bb56553b421d17bd
-
SSDEEP
12288:0Mrty90+edwi3ijm7mWdGAqN7bI+wN9RDDHEyksPdfaGnEWgvo6lT:pyO7i67m1AqN7bI+Obkyk+rE7dZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-