General
-
Target
5e7c5b6487f6d543fcf04767ecb616ac.bin
-
Size
995KB
-
Sample
230328-bywnvsgc69
-
MD5
715157948a28352b505c64b2fc53c904
-
SHA1
55919d60c41c19d528b4e17c6bc7c29162171501
-
SHA256
d86795f4789d57a7355afd89f5db02e3b5c2b404a413ddcbd0d6924e94c52d02
-
SHA512
a3bd6e5740e9e16995fd786aabd03c8b2ff7b1b23bd7dfb3afc5ca5d2100ccb6705e2722378dc2d2b31edb369ca5a9c03a677df33f489725fa1e122059419f8d
-
SSDEEP
24576:oF7Ix2GWTScIymqJS3cZoihVBzOYWwclt10bKjeZFnyhYabBv:Gcx2GWTjhmP3EoiPBzHclriEefnymadv
Static task
static1
Behavioral task
behavioral1
Sample
eda79afb5d162cda849d6b683b530aa45158cefb502adc56064993d3110289ac.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
braza
193.233.20.32:4125
-
auth_value
ebe61b54deeef75cf8466416c0857088
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
eda79afb5d162cda849d6b683b530aa45158cefb502adc56064993d3110289ac.exe
-
Size
1.0MB
-
MD5
5e7c5b6487f6d543fcf04767ecb616ac
-
SHA1
88b0c5f020b5b65415ba3029ededfdaef92a6a85
-
SHA256
eda79afb5d162cda849d6b683b530aa45158cefb502adc56064993d3110289ac
-
SHA512
74a628b1e314354d7ee09647c5b030052e6159ed2c4d2a981cbb090541b1702dcea016e2a1282ca2ab58b2e02eeb962ee6e9fcb9bb62211162270c08f779a3f8
-
SSDEEP
24576:Wy/dKJDSoz1G4YfR5Hde7gaFRkMW5EqiibubxUpf:l/dKQoz1G4u9ecqkVUs4S
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-