General
-
Target
48cbccc5fad7332c39d2668e0275e0103e0284a165f57349a26a5e1a7ec15371.bin
-
Size
1.5MB
-
Sample
230506-1krv7aha89
-
MD5
1a93aa4912d4a0cf0c194e73dab4231a
-
SHA1
a51c920dc848994d1edd1e234fd3cc4f20e5004a
-
SHA256
48cbccc5fad7332c39d2668e0275e0103e0284a165f57349a26a5e1a7ec15371
-
SHA512
5d1e4963e5dccc96639dff8f5fbd972f80325547d2af46078e11866d5a72251a97692b9dd2d760e0ec7cec70b7f35cb138460b76af1c8ec74013baaf81decda9
-
SSDEEP
24576:9bydDB2sdiaMu2oe3etwg6Qo580gpvL3jHQFZSBX6V6U6AjkHMOHZtk:MdDBrM+eOtN7o2ZvXHQSKqH9H
Static task
static1
Behavioral task
behavioral1
Sample
48cbccc5fad7332c39d2668e0275e0103e0284a165f57349a26a5e1a7ec15371.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
48cbccc5fad7332c39d2668e0275e0103e0284a165f57349a26a5e1a7ec15371.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Targets
-
-
Target
48cbccc5fad7332c39d2668e0275e0103e0284a165f57349a26a5e1a7ec15371.bin
-
Size
1.5MB
-
MD5
1a93aa4912d4a0cf0c194e73dab4231a
-
SHA1
a51c920dc848994d1edd1e234fd3cc4f20e5004a
-
SHA256
48cbccc5fad7332c39d2668e0275e0103e0284a165f57349a26a5e1a7ec15371
-
SHA512
5d1e4963e5dccc96639dff8f5fbd972f80325547d2af46078e11866d5a72251a97692b9dd2d760e0ec7cec70b7f35cb138460b76af1c8ec74013baaf81decda9
-
SSDEEP
24576:9bydDB2sdiaMu2oe3etwg6Qo580gpvL3jHQFZSBX6V6U6AjkHMOHZtk:MdDBrM+eOtN7o2ZvXHQSKqH9H
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-