General
-
Target
c52eb4ac91e79e6c1a2c5f31b9b53b3e.exe
-
Size
1.2MB
-
Sample
230319-js9mjafe78
-
MD5
c52eb4ac91e79e6c1a2c5f31b9b53b3e
-
SHA1
d8f017b92022e29ee9778c34dd2fe31d943f3f1d
-
SHA256
f1b12d155c28e774f2745c793778a4a9c9b23cc0848a8f530e8824e315b8c19e
-
SHA512
78ec86239db4a20e07053f4886be57424797936b1a6bbcd9d476fe57524d5474e9f1f40c3599de16073e80e3cfbce786fe95a71811e6d1603e1dce23983369db
-
SSDEEP
12288:ExL48EidugdwP24A/fg6PRj8l8clbzTvvryMsgj50gzKIO0e5Uk7gsUlMhXocWFF:KbXa+Ik81vqYOyhMhWypjrY6PjnErD
Static task
static1
Behavioral task
behavioral1
Sample
c52eb4ac91e79e6c1a2c5f31b9b53b3e.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
c52eb4ac91e79e6c1a2c5f31b9b53b3e.exe
-
Size
1.2MB
-
MD5
c52eb4ac91e79e6c1a2c5f31b9b53b3e
-
SHA1
d8f017b92022e29ee9778c34dd2fe31d943f3f1d
-
SHA256
f1b12d155c28e774f2745c793778a4a9c9b23cc0848a8f530e8824e315b8c19e
-
SHA512
78ec86239db4a20e07053f4886be57424797936b1a6bbcd9d476fe57524d5474e9f1f40c3599de16073e80e3cfbce786fe95a71811e6d1603e1dce23983369db
-
SSDEEP
12288:ExL48EidugdwP24A/fg6PRj8l8clbzTvvryMsgj50gzKIO0e5Uk7gsUlMhXocWFF:KbXa+Ik81vqYOyhMhWypjrY6PjnErD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-