General
-
Target
8257367cbc16f12da730ae45a12c45554bf9a12f16cf27c3f54f3d8ab871a3fb.zip
-
Size
598KB
-
Sample
230310-nf5j9sdb99
-
MD5
10a0ea4d84d196980d4c5183175766d1
-
SHA1
360f2092c67c53eb12f315d556d2eab01c402a7e
-
SHA256
dba43aa69831aabbefc729404532336c3dd23a617b04efa6462d7da674c7a106
-
SHA512
02c6e634d16c8195c67f072a3d1fe974f0cb44bc30fe08d6aeb3be9fa4c74ba7b53c79353474f03687cebd7aa865238848ce0afe0457783bb8b1372407d94142
-
SSDEEP
12288:EFOIIM8azRQaovsQqS/sXtRfLIO2a8ii28NrqLMvTr5e2/xJZzhfh2U6:QOId8KRQ3vpqDvQ28NroY/xXzhfhG
Static task
static1
Behavioral task
behavioral1
Sample
8257367cbc16f12da730ae45a12c45554bf9a12f16cf27c3f54f3d8ab871a3fb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8257367cbc16f12da730ae45a12c45554bf9a12f16cf27c3f54f3d8ab871a3fb.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
8257367cbc16f12da730ae45a12c45554bf9a12f16cf27c3f54f3d8ab871a3fb.exe
-
Size
716KB
-
MD5
6a6a0cc212d82b7e19c05c3c41a68914
-
SHA1
41cda4803b66e5db89eebc6651fe4ae2b0f21f4b
-
SHA256
8257367cbc16f12da730ae45a12c45554bf9a12f16cf27c3f54f3d8ab871a3fb
-
SHA512
5876f235894eeafae9376bebfa31f188cf1ba8c7d258ff9d64e700be6c865005635241d23bba7e9a6f81434d3698f513ca8e4cd9c1c95e182da48528e6f734eb
-
SSDEEP
12288:XkQH4MLTHJ9dj9pi/3TtReM4AreTcrrVGU5k7yDpLD5kNS2U/:T4MnHJ9JK3TtReMa8r0U5iyfkNW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-