General
-
Target
c468106ab02c3e8ba737b0c9fef3421e.exe
-
Size
490KB
-
Sample
230510-lnhpcshb5t
-
MD5
c468106ab02c3e8ba737b0c9fef3421e
-
SHA1
90b2bee90a3037574ec5e8876a4379c2f61475f9
-
SHA256
b376acd1f36f305c03b06fdfd12dc49847d576502355e42409f836e8d3ec8f6f
-
SHA512
268c06e0d940a722a7637822815b6ffb5090016a73527da59f987bae76cf95792f02801500adb825c208c7270a6823c66e4c15e9286278a69b30269d44fbfed2
-
SSDEEP
12288:2Mrfy904B+Po9kZu+CPTA1LxTCl3kt9p:1y9UwmZu+CPiksp
Static task
static1
Behavioral task
behavioral1
Sample
c468106ab02c3e8ba737b0c9fef3421e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c468106ab02c3e8ba737b0c9fef3421e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lurfa
217.196.96.102:4132
-
auth_value
f6c26c2a5c6c25ae5b2e9abf31f6341d
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
c468106ab02c3e8ba737b0c9fef3421e.exe
-
Size
490KB
-
MD5
c468106ab02c3e8ba737b0c9fef3421e
-
SHA1
90b2bee90a3037574ec5e8876a4379c2f61475f9
-
SHA256
b376acd1f36f305c03b06fdfd12dc49847d576502355e42409f836e8d3ec8f6f
-
SHA512
268c06e0d940a722a7637822815b6ffb5090016a73527da59f987bae76cf95792f02801500adb825c208c7270a6823c66e4c15e9286278a69b30269d44fbfed2
-
SSDEEP
12288:2Mrfy904B+Po9kZu+CPTA1LxTCl3kt9p:1y9UwmZu+CPiksp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-