General
-
Target
0161b44615068b3af2425cebd0d8e584.exe
-
Size
1023KB
-
Sample
230327-rbjnsafg9x
-
MD5
0161b44615068b3af2425cebd0d8e584
-
SHA1
f221f8a49194f63c75e168e39bfd95897825851a
-
SHA256
601207ff2909da97272ca4d22cd8ba62012fe4292e902df7b0c3af0b1940c46b
-
SHA512
45e0ce56f2d12cd78d9e827c23c83fdf2b40f70f44c5bad51bf2b079ceefea8be832c36b9c90163b4e4dd6337241f78f16a992ac9e45a515b787d538b39dffe5
-
SSDEEP
24576:oyyT/1XYqWCKBjNfUS5idDS/m/+fEcQTa0SYtrzejaBF/:vWX5KBBfdi9mmXcIaXo3BF
Static task
static1
Behavioral task
behavioral1
Sample
0161b44615068b3af2425cebd0d8e584.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
vila
193.233.20.33:4125
-
auth_value
94b115d79ddcab0a0fb9dfab8e225c3b
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
0161b44615068b3af2425cebd0d8e584.exe
-
Size
1023KB
-
MD5
0161b44615068b3af2425cebd0d8e584
-
SHA1
f221f8a49194f63c75e168e39bfd95897825851a
-
SHA256
601207ff2909da97272ca4d22cd8ba62012fe4292e902df7b0c3af0b1940c46b
-
SHA512
45e0ce56f2d12cd78d9e827c23c83fdf2b40f70f44c5bad51bf2b079ceefea8be832c36b9c90163b4e4dd6337241f78f16a992ac9e45a515b787d538b39dffe5
-
SSDEEP
24576:oyyT/1XYqWCKBjNfUS5idDS/m/+fEcQTa0SYtrzejaBF/:vWX5KBBfdi9mmXcIaXo3BF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-