General
-
Target
c0fa34219c589c4b817b28e3c664d331.exe
-
Size
1.2MB
-
Sample
230319-js9brshf2z
-
MD5
c0fa34219c589c4b817b28e3c664d331
-
SHA1
05224f4661b2ef7095676aa25c42bc67deb5b610
-
SHA256
0f5180f0a46093d20e48801e630f42ee550c05d8daa8e7f651d0df69d36dbd4a
-
SHA512
1fdaad9746e0ee95a58406b83bc6ca36cd0bd758d9a2e4f823c7852b40fc6265026b923f4588636a1335ce5f4e4e9e59dc7ec511a9713ffa65ce61abfe247835
-
SSDEEP
12288:UxL48EidugdwP24A/fg6PRj8l8clbzTvvryMsgj50gzKIO0e5Uk7gsUlMhXocWFF:6bXa+Ik81vqYOyhMhWypjrY6PjnErD
Static task
static1
Behavioral task
behavioral1
Sample
c0fa34219c589c4b817b28e3c664d331.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
c0fa34219c589c4b817b28e3c664d331.exe
-
Size
1.2MB
-
MD5
c0fa34219c589c4b817b28e3c664d331
-
SHA1
05224f4661b2ef7095676aa25c42bc67deb5b610
-
SHA256
0f5180f0a46093d20e48801e630f42ee550c05d8daa8e7f651d0df69d36dbd4a
-
SHA512
1fdaad9746e0ee95a58406b83bc6ca36cd0bd758d9a2e4f823c7852b40fc6265026b923f4588636a1335ce5f4e4e9e59dc7ec511a9713ffa65ce61abfe247835
-
SSDEEP
12288:UxL48EidugdwP24A/fg6PRj8l8clbzTvvryMsgj50gzKIO0e5Uk7gsUlMhXocWFF:6bXa+Ik81vqYOyhMhWypjrY6PjnErD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-