General
-
Target
bc59b7084d6bc5398c8edcf790449802.bin
-
Size
1.4MB
-
Sample
230504-cb55fsbe51
-
MD5
95325b3e3cab0c7bf608f53c88d09a0a
-
SHA1
13121cee45d034f62c64673b8f6469100f959317
-
SHA256
d95acec1d178204123e1fe96fad6b9316fedb722f159217c0681772e3c5a205f
-
SHA512
f17adfc12d61d3052475578fdddc4c98df515ee4be6ae3fd1c1ec8ac70f11b29ebf9bf71483b2a82d29c805713db68b0f5900ff2cde2030748196e7d041dabcf
-
SSDEEP
24576:V4+2NBwyNLzMpsjl+NmtZQ+9cQKfl/RWA/ZY9POknfeaXu2fsp227yS:L2EyNLzgsjcUAnQK95WA6GknXeMCbR
Static task
static1
Behavioral task
behavioral1
Sample
493a19faeacd4d8d427b79423c3b0e5bee8d2ae638e7dc7cc7a3d4f38fc523aa.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
493a19faeacd4d8d427b79423c3b0e5bee8d2ae638e7dc7cc7a3d4f38fc523aa.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Targets
-
-
Target
493a19faeacd4d8d427b79423c3b0e5bee8d2ae638e7dc7cc7a3d4f38fc523aa.exe
-
Size
1.4MB
-
MD5
bc59b7084d6bc5398c8edcf790449802
-
SHA1
560226b14e8f6c122828c60b6deadd577553f8b5
-
SHA256
493a19faeacd4d8d427b79423c3b0e5bee8d2ae638e7dc7cc7a3d4f38fc523aa
-
SHA512
d3e21a0e0767204c62c37312dd36c4be2a6c2093c0fa871eee84372542c6b80f02f67ee60c38fb6bf6de86ffb446be6b6201872cb46403cd18c03813387b72cc
-
SSDEEP
24576:Ny77TOO0uB0Ddntno7u2Dbl+Z12v4WWCUeq17R8TUU0bYRm9mQV:o7/OVDVtoR+Zkv1ee+R8Zmt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-