General
-
Target
6b8c7f61fa6d0f51745b5b666c892333.exe
-
Size
1.0MB
-
Sample
230327-2chg8ahe8x
-
MD5
6b8c7f61fa6d0f51745b5b666c892333
-
SHA1
e5786735089ee45eddcdbadaca39f87859de2126
-
SHA256
c434cfd02b14df392aac52bc8d329a336098b25cee9efc81d704b5341ba0613e
-
SHA512
30ae33351c2600363863cacf5488cfb744331e57c706006900174f612da1608de3331a750d994a717ce497b5c9d09ddac4bbd701faac4ef770c79e4869ee32c5
-
SSDEEP
24576:Cyo8bwSju+w8Dsxyi9+KTWUENNiflCerAA:pDbwPdxL8uIX
Static task
static1
Behavioral task
behavioral1
Sample
6b8c7f61fa6d0f51745b5b666c892333.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
renta
176.113.115.145:4125
-
auth_value
359596fd5b36e9925ade4d9a1846bafb
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
6b8c7f61fa6d0f51745b5b666c892333.exe
-
Size
1.0MB
-
MD5
6b8c7f61fa6d0f51745b5b666c892333
-
SHA1
e5786735089ee45eddcdbadaca39f87859de2126
-
SHA256
c434cfd02b14df392aac52bc8d329a336098b25cee9efc81d704b5341ba0613e
-
SHA512
30ae33351c2600363863cacf5488cfb744331e57c706006900174f612da1608de3331a750d994a717ce497b5c9d09ddac4bbd701faac4ef770c79e4869ee32c5
-
SSDEEP
24576:Cyo8bwSju+w8Dsxyi9+KTWUENNiflCerAA:pDbwPdxL8uIX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-