General
-
Target
004beb7e66d2fc86c14913a707f393fd53cc6a4bb704e6963b15c003a8c06cd6
-
Size
459KB
-
Sample
230311-s91kmaca91
-
MD5
40f325f1a986f51e0e106f7e7743c71c
-
SHA1
61a1ab2f0fb404ed882e6670cdbfa1813c96fa4d
-
SHA256
004beb7e66d2fc86c14913a707f393fd53cc6a4bb704e6963b15c003a8c06cd6
-
SHA512
a79527fa4e32cce8b09b4ec680813618a3e7c9f8f6a70b98997fb295b45c5315248041fb9e64b21b8bb38cae1d71ed5d914b4c21bf1d838bfccf48a53f8e8152
-
SSDEEP
12288:G9oD+S8zhn8Z+RGOR9UJWzflQ9PWPIsDq:G9Fd2+Ma9UkJQtWPrDq
Static task
static1
Behavioral task
behavioral1
Sample
004beb7e66d2fc86c14913a707f393fd53cc6a4bb704e6963b15c003a8c06cd6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
well
193.233.20.28:4125
-
auth_value
265e7373dd436339d88347c08a10b402
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
004beb7e66d2fc86c14913a707f393fd53cc6a4bb704e6963b15c003a8c06cd6
-
Size
459KB
-
MD5
40f325f1a986f51e0e106f7e7743c71c
-
SHA1
61a1ab2f0fb404ed882e6670cdbfa1813c96fa4d
-
SHA256
004beb7e66d2fc86c14913a707f393fd53cc6a4bb704e6963b15c003a8c06cd6
-
SHA512
a79527fa4e32cce8b09b4ec680813618a3e7c9f8f6a70b98997fb295b45c5315248041fb9e64b21b8bb38cae1d71ed5d914b4c21bf1d838bfccf48a53f8e8152
-
SSDEEP
12288:G9oD+S8zhn8Z+RGOR9UJWzflQ9PWPIsDq:G9Fd2+Ma9UkJQtWPrDq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-