General
-
Target
07e822e04efd7d16512644f36040540872e61f569e80ef8c1671da58e71e654f
-
Size
782KB
-
Sample
230510-z2gk4scb3t
-
MD5
eb01ab79b023db0e59ab5fa76dd5a171
-
SHA1
9e03d625556bba40513d80bb29484239fade985a
-
SHA256
07e822e04efd7d16512644f36040540872e61f569e80ef8c1671da58e71e654f
-
SHA512
9c3a387b77f08ddef4575a80976b5a94e45c84da45316ceb77db673f230954852bebebae08e8a3bbec995e05d78963e7c742dcc282408b3ecb493ebe9ef49a2e
-
SSDEEP
12288:0MrFy905AIeAv2gXGJvf2blveK5ATOmdZo5r0SKt1Y+VZKTbbVruzesXGIk+GpYf:Jy03yTpZq5K/Hm3xuagqq
Static task
static1
Behavioral task
behavioral1
Sample
07e822e04efd7d16512644f36040540872e61f569e80ef8c1671da58e71e654f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lider
217.196.96.102:4132
-
auth_value
86fd821be73f28dc4769ad612e92a599
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
07e822e04efd7d16512644f36040540872e61f569e80ef8c1671da58e71e654f
-
Size
782KB
-
MD5
eb01ab79b023db0e59ab5fa76dd5a171
-
SHA1
9e03d625556bba40513d80bb29484239fade985a
-
SHA256
07e822e04efd7d16512644f36040540872e61f569e80ef8c1671da58e71e654f
-
SHA512
9c3a387b77f08ddef4575a80976b5a94e45c84da45316ceb77db673f230954852bebebae08e8a3bbec995e05d78963e7c742dcc282408b3ecb493ebe9ef49a2e
-
SSDEEP
12288:0MrFy905AIeAv2gXGJvf2blveK5ATOmdZo5r0SKt1Y+VZKTbbVruzesXGIk+GpYf:Jy03yTpZq5K/Hm3xuagqq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-