General
-
Target
2000feec0d6724283f2bb9e68fd99b7b.exe
-
Size
1.0MB
-
Sample
230328-kpavgabf9s
-
MD5
2000feec0d6724283f2bb9e68fd99b7b
-
SHA1
f7a16f90191517a2bebe4a88d247737415ec3d9f
-
SHA256
d59416ce222f3595a77a552a602b73f99b2c4c2ea236b1a52164ae989ec57eb2
-
SHA512
d9f19091dda387490c2b2412fa62b2b104e3df176e282da0e1a64a03ce1989e820c84357153dab85b4eface1c2c2e4901ab6604d85faa206d63ec6c7b438d71f
-
SSDEEP
24576:PynKWyhE7uqjJcso13MaaVPsjjBm4LyWrHIOahp:aw27uqjjsMaaVUn1LP0
Static task
static1
Behavioral task
behavioral1
Sample
2000feec0d6724283f2bb9e68fd99b7b.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
renta
176.113.115.145:4125
-
auth_value
359596fd5b36e9925ade4d9a1846bafb
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
2000feec0d6724283f2bb9e68fd99b7b.exe
-
Size
1.0MB
-
MD5
2000feec0d6724283f2bb9e68fd99b7b
-
SHA1
f7a16f90191517a2bebe4a88d247737415ec3d9f
-
SHA256
d59416ce222f3595a77a552a602b73f99b2c4c2ea236b1a52164ae989ec57eb2
-
SHA512
d9f19091dda387490c2b2412fa62b2b104e3df176e282da0e1a64a03ce1989e820c84357153dab85b4eface1c2c2e4901ab6604d85faa206d63ec6c7b438d71f
-
SSDEEP
24576:PynKWyhE7uqjJcso13MaaVPsjjBm4LyWrHIOahp:aw27uqjjsMaaVUn1LP0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-