General
-
Target
6d82f975be0abbbcba5d647eb30bdfb638a1e4cc95d9f3e98145798a6d4703d1
-
Size
465KB
-
Sample
230311-ey7mxaac3v
-
MD5
01cbe633e81f624b06f1cdc474ff5b24
-
SHA1
44fcbe76e59f8b60a7943adddeec28b0567f49a0
-
SHA256
6d82f975be0abbbcba5d647eb30bdfb638a1e4cc95d9f3e98145798a6d4703d1
-
SHA512
63e298f4c18d50a04ab36278a43dbd123be2b8996cfadf4a0ba298a9a20f28a347afc371c98e7714d22eea58da0b40487928801f42ea1c8cf63803fa87987104
-
SSDEEP
6144:WYFpyHi0jvNVGnNMDLTxqQFVXM7ABMFn8/nYdeoozd8uEkeKUoqzVPE:lYHi0TT46TxqQXhE8/Yde1yhKxSE
Static task
static1
Behavioral task
behavioral1
Sample
6d82f975be0abbbcba5d647eb30bdfb638a1e4cc95d9f3e98145798a6d4703d1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
6d82f975be0abbbcba5d647eb30bdfb638a1e4cc95d9f3e98145798a6d4703d1
-
Size
465KB
-
MD5
01cbe633e81f624b06f1cdc474ff5b24
-
SHA1
44fcbe76e59f8b60a7943adddeec28b0567f49a0
-
SHA256
6d82f975be0abbbcba5d647eb30bdfb638a1e4cc95d9f3e98145798a6d4703d1
-
SHA512
63e298f4c18d50a04ab36278a43dbd123be2b8996cfadf4a0ba298a9a20f28a347afc371c98e7714d22eea58da0b40487928801f42ea1c8cf63803fa87987104
-
SSDEEP
6144:WYFpyHi0jvNVGnNMDLTxqQFVXM7ABMFn8/nYdeoozd8uEkeKUoqzVPE:lYHi0TT46TxqQXhE8/Yde1yhKxSE
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-