General
-
Target
f0ef41f21d11ddcacffc2b2f729eb6daa6268a188406756e666f82545c44a79b
-
Size
479KB
-
Sample
230506-q1dcmahd88
-
MD5
8b887e5b0a9f01a2d8cacf54bac22d04
-
SHA1
5460eeffc19178105386162265af75e6773495d4
-
SHA256
f0ef41f21d11ddcacffc2b2f729eb6daa6268a188406756e666f82545c44a79b
-
SHA512
34d8428284a36097b10d72fb4fc1173c7e9b38b9fcc61e86e10fea9ad5376f13abefadb73254141b479ad2ebe800c808607666c09940ff1c371161dce204af43
-
SSDEEP
12288:lMrxy90QK24d62bOcfjMsX1qnPcuKZ2sSBtk3Euv:sykVxP7r12sGtkp
Static task
static1
Behavioral task
behavioral1
Sample
f0ef41f21d11ddcacffc2b2f729eb6daa6268a188406756e666f82545c44a79b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxud
217.196.96.101:4132
-
auth_value
f1403d964c52b6641ba1ef14803e6e74
Targets
-
-
Target
f0ef41f21d11ddcacffc2b2f729eb6daa6268a188406756e666f82545c44a79b
-
Size
479KB
-
MD5
8b887e5b0a9f01a2d8cacf54bac22d04
-
SHA1
5460eeffc19178105386162265af75e6773495d4
-
SHA256
f0ef41f21d11ddcacffc2b2f729eb6daa6268a188406756e666f82545c44a79b
-
SHA512
34d8428284a36097b10d72fb4fc1173c7e9b38b9fcc61e86e10fea9ad5376f13abefadb73254141b479ad2ebe800c808607666c09940ff1c371161dce204af43
-
SSDEEP
12288:lMrxy90QK24d62bOcfjMsX1qnPcuKZ2sSBtk3Euv:sykVxP7r12sGtkp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-