General
-
Target
3aad8ffff71d839067849d72d77a5648.exe
-
Size
1.2MB
-
Sample
230319-lhmfcsfh33
-
MD5
3aad8ffff71d839067849d72d77a5648
-
SHA1
6da38370e1c9c9d3cd9bd1626cd3bb960247714e
-
SHA256
52682cb2b7f11cff4905c76d589e8de592e1678d271e369ee11aff15a2c74ef1
-
SHA512
a73ec1e02d92f913b9b1bc0763ed3ccbc05127208747de86dcc7911e156458d24c642728fad8cb0d8996f2ce4c9d7dac87d26e698afade717e4548337b69b0b2
-
SSDEEP
24576:2WksAUpYGbPrZhqNdhHkLPSPiBKo7LZvLtPY8GOCGRAR:2WkUYiPrXodq6qBLBJAO
Static task
static1
Behavioral task
behavioral1
Sample
3aad8ffff71d839067849d72d77a5648.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
3aad8ffff71d839067849d72d77a5648.exe
-
Size
1.2MB
-
MD5
3aad8ffff71d839067849d72d77a5648
-
SHA1
6da38370e1c9c9d3cd9bd1626cd3bb960247714e
-
SHA256
52682cb2b7f11cff4905c76d589e8de592e1678d271e369ee11aff15a2c74ef1
-
SHA512
a73ec1e02d92f913b9b1bc0763ed3ccbc05127208747de86dcc7911e156458d24c642728fad8cb0d8996f2ce4c9d7dac87d26e698afade717e4548337b69b0b2
-
SSDEEP
24576:2WksAUpYGbPrZhqNdhHkLPSPiBKo7LZvLtPY8GOCGRAR:2WkUYiPrXodq6qBLBJAO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-