General
-
Target
setup.exe
-
Size
1.0MB
-
Sample
230319-q5tkeagf28
-
MD5
13d663251ecd6368c2ccfad1e19a2aa0
-
SHA1
dc11f14bf1af927275451db1b91a43bbc8a4c50a
-
SHA256
934f9cf6bc79eb4e4a2e9b82df7f024294c88eba57f5a19d43d2a9c3bbd7dc92
-
SHA512
a50fcbaaeb0fae15e62f36ae9403735cefe0a55b33cc4a3de48821ea66ff1c578adcacc5c9cc16cc63cae6d4ae4e8a85e9da44cab6ba4fd42ee564dfb4e54db1
-
SSDEEP
24576:FyKTPtqPP92E7XFSavH9IrJJBDUSd+UzvhLp50:gK5qPP92IX9IpPHv1
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
setup.exe
-
Size
1.0MB
-
MD5
13d663251ecd6368c2ccfad1e19a2aa0
-
SHA1
dc11f14bf1af927275451db1b91a43bbc8a4c50a
-
SHA256
934f9cf6bc79eb4e4a2e9b82df7f024294c88eba57f5a19d43d2a9c3bbd7dc92
-
SHA512
a50fcbaaeb0fae15e62f36ae9403735cefe0a55b33cc4a3de48821ea66ff1c578adcacc5c9cc16cc63cae6d4ae4e8a85e9da44cab6ba4fd42ee564dfb4e54db1
-
SSDEEP
24576:FyKTPtqPP92E7XFSavH9IrJJBDUSd+UzvhLp50:gK5qPP92IX9IpPHv1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-