General
-
Target
a8edd42ca27e45b8831c0bbae9f4b7a2.bin
-
Size
1.1MB
-
Sample
230413-b5sksage83
-
MD5
cfed9b2fc2cb562ca3a160d5434b7484
-
SHA1
1abca26c9eec775d011e4bcf15529d7e81c5ed97
-
SHA256
b2406190573157317267986231796a271a961d88f93c598f8f559fd29254c63c
-
SHA512
4f51e12b5d90a8b74435e73834f81d4f898c6a9c35bb600a8d7716d0506634ca1c086365add1821496c9e0c3f469bdc3e6f67bbc3fec24457f20cea86381f9b2
-
SSDEEP
24576:kvB4T8UUzJOINrLBkSIqSNwYRfSiUNqKsw:kp4LyJOIwPJStsw
Static task
static1
Behavioral task
behavioral1
Sample
7df83d09198b8535e4ea95c862283aac5b5e26c89173f86666b7b3b84024fd2a.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
maxi
185.161.248.90:4125
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Targets
-
-
Target
7df83d09198b8535e4ea95c862283aac5b5e26c89173f86666b7b3b84024fd2a.exe
-
Size
1.1MB
-
MD5
a8edd42ca27e45b8831c0bbae9f4b7a2
-
SHA1
5cf24fc2d3f935c0e8929322ee783c5b28956bf6
-
SHA256
7df83d09198b8535e4ea95c862283aac5b5e26c89173f86666b7b3b84024fd2a
-
SHA512
6837b3ca2e2791c9f8e69d51a78a2433e026b9a3c4d4644826c8b65ddeca388b5e326a49557b83b7ea61ab809827ce9c627bf746e3ac4f9d8c67f68b9d7baa82
-
SSDEEP
24576:3yYLhF+X2wbzRomS8VnvQ/CpBk/OobDLRLYxe9Yw0s2oJ:CY1F+VSmvA4BNobDhYxCJ2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-