General
-
Target
40f45b29f62c96640b2a63dd7ac82af790691772ee6de48e46a243e78ee428bf.zip
-
Size
608KB
-
Sample
230308-ps8m5agd48
-
MD5
b42b184ae08aeae9e5ea33cc6194e458
-
SHA1
2754440240d993bb7138a8697899c4f31cfa8bd1
-
SHA256
a446dc39a777fb60194e5e8e25193999c061a7714d09e5bc5273e19f9caee350
-
SHA512
4737fc516ba1556e05f26ce2167a0423d3c9897054cb4fea029e1487bd336ca8fc751aad27b4264d93bdeaba549ad427ca82a3eae765dba8571e72f6d65c01a7
-
SSDEEP
12288:S43uAi7lsBA2Ss5rVIpl5EGQthsOb9ztRkMZWQqiRL+bMCAeE:S0fixsSVU/Gwzb91ZWcybMJH
Static task
static1
Behavioral task
behavioral1
Sample
40f45b29f62c96640b2a63dd7ac82af790691772ee6de48e46a243e78ee428bf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
40f45b29f62c96640b2a63dd7ac82af790691772ee6de48e46a243e78ee428bf.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
garry
193.56.146.11:4173
-
auth_value
210ba56bf751fefe327f26e00f0be5a9
Extracted
amadey
3.68
193.56.146.218/images/IMG_489440/index.php
Targets
-
-
Target
40f45b29f62c96640b2a63dd7ac82af790691772ee6de48e46a243e78ee428bf.exe
-
Size
731KB
-
MD5
2ee41b836f7c707d746c6a833b7e1a77
-
SHA1
589f9ff89bbb0a938ffbea1cc221fe34065f84f6
-
SHA256
40f45b29f62c96640b2a63dd7ac82af790691772ee6de48e46a243e78ee428bf
-
SHA512
b2a643e9341c94ff05a1bc2c216130972d968a79a32c35a0fc55f90a36bad8d007c30456454e1bf103c308b8fda74eab537616196730b1f1530117589ddea158
-
SSDEEP
12288:XEsDDeWzZ9ZiS3M7iS3Yv95AAzTHOBoGzsgW+L6LVt5VBI6rro1RqouxRQRuz:KW9T33M7iSiTVWa+L6ht5VxrukoSRQAz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-