General
-
Target
fc2427b65dd7f22af54f61c18450734d52b8a548398d1c39fe385957d2a9cee2
-
Size
923KB
-
Sample
230502-zyyefsed3v
-
MD5
2092b670abfd60f628a3f412d1f1db50
-
SHA1
59c861a23aa6dbb04ab15a7b121fa4513d06470e
-
SHA256
fc2427b65dd7f22af54f61c18450734d52b8a548398d1c39fe385957d2a9cee2
-
SHA512
606de56a450ec361a7278489b0a2cf6caeb37adc588fae731f66382a87aec3c3be59539db6c8c39843b5e86b413825904fafe0c2a84df7961e000a83d38992d1
-
SSDEEP
24576:OylIHMJCsODv6eRvQyHBXLqsXZf1XoPYy+:desQs2qExpIY
Static task
static1
Behavioral task
behavioral1
Sample
fc2427b65dd7f22af54f61c18450734d52b8a548398d1c39fe385957d2a9cee2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lupa
217.196.96.56:4138
-
auth_value
fcb02fce9bc10c56a9841d56974bd7b8
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
fc2427b65dd7f22af54f61c18450734d52b8a548398d1c39fe385957d2a9cee2
-
Size
923KB
-
MD5
2092b670abfd60f628a3f412d1f1db50
-
SHA1
59c861a23aa6dbb04ab15a7b121fa4513d06470e
-
SHA256
fc2427b65dd7f22af54f61c18450734d52b8a548398d1c39fe385957d2a9cee2
-
SHA512
606de56a450ec361a7278489b0a2cf6caeb37adc588fae731f66382a87aec3c3be59539db6c8c39843b5e86b413825904fafe0c2a84df7961e000a83d38992d1
-
SSDEEP
24576:OylIHMJCsODv6eRvQyHBXLqsXZf1XoPYy+:desQs2qExpIY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-