General
-
Target
e8fcd3f4c6112924e9f1d66ef1935419.exe
-
Size
1.0MB
-
Sample
230328-hfr2aahd74
-
MD5
e8fcd3f4c6112924e9f1d66ef1935419
-
SHA1
9fa55b3d56cd4de75a2573fed7b2c5bbbfef7608
-
SHA256
54e35ed1cf612cd929642c9fa1bee248c16d7b705b2e3f105008ab6ffe74ad51
-
SHA512
e4857fe913d2afd56d2e572afbb77af0de9da4d8da555b670adad5d0cd44649dc8c795e0055d483318de3a59b759d4362640515de9aa33f74f87d14ad012c590
-
SSDEEP
12288:4MrEy90BRgvjnSs2/YO7E2fKT2G6HiAu+hTx2HlNooHAW5SnyQJsO4NkkYDn3lZ9:syqR02/8T2GiN928h1JsJ+DEIcFdup
Static task
static1
Behavioral task
behavioral1
Sample
e8fcd3f4c6112924e9f1d66ef1935419.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
renta
176.113.115.145:4125
-
auth_value
359596fd5b36e9925ade4d9a1846bafb
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
e8fcd3f4c6112924e9f1d66ef1935419.exe
-
Size
1.0MB
-
MD5
e8fcd3f4c6112924e9f1d66ef1935419
-
SHA1
9fa55b3d56cd4de75a2573fed7b2c5bbbfef7608
-
SHA256
54e35ed1cf612cd929642c9fa1bee248c16d7b705b2e3f105008ab6ffe74ad51
-
SHA512
e4857fe913d2afd56d2e572afbb77af0de9da4d8da555b670adad5d0cd44649dc8c795e0055d483318de3a59b759d4362640515de9aa33f74f87d14ad012c590
-
SSDEEP
12288:4MrEy90BRgvjnSs2/YO7E2fKT2G6HiAu+hTx2HlNooHAW5SnyQJsO4NkkYDn3lZ9:syqR02/8T2GiN928h1JsJ+DEIcFdup
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-