General
-
Target
f862393a2401b750a0082b80fbaf6982.exe
-
Size
490KB
-
Sample
230510-pp7awsfh95
-
MD5
f862393a2401b750a0082b80fbaf6982
-
SHA1
e9519809c352ed8460278d7e4f06c5774e38d64a
-
SHA256
ada4e796f71690f7f8681bcfac62445e470e4987c530b8781daacf91d7a5017d
-
SHA512
d427c7aa1c445107323f29e0c8e76e7f24963c5c97b305b419afa76b8ffd1dcecdbc815215814edf948ba08672f68e0b38b1893cbf205812845d2264d4a19787
-
SSDEEP
12288:qMrty90VDN6wb0O+MN/rsnyXiIs1Uf/h39Kljd:jyoNf3lQL1arKld
Static task
static1
Behavioral task
behavioral1
Sample
f862393a2401b750a0082b80fbaf6982.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f862393a2401b750a0082b80fbaf6982.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lirot
217.196.96.102:4132
-
auth_value
0719dc312a5ab622cdc667a6937558df
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
f862393a2401b750a0082b80fbaf6982.exe
-
Size
490KB
-
MD5
f862393a2401b750a0082b80fbaf6982
-
SHA1
e9519809c352ed8460278d7e4f06c5774e38d64a
-
SHA256
ada4e796f71690f7f8681bcfac62445e470e4987c530b8781daacf91d7a5017d
-
SHA512
d427c7aa1c445107323f29e0c8e76e7f24963c5c97b305b419afa76b8ffd1dcecdbc815215814edf948ba08672f68e0b38b1893cbf205812845d2264d4a19787
-
SSDEEP
12288:qMrty90VDN6wb0O+MN/rsnyXiIs1Uf/h39Kljd:jyoNf3lQL1arKld
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-