General
-
Target
f1e8c4d3c0ad964b781157e737ccc4367ac83bbbc6447897967ed323a2d32a0c
-
Size
600KB
-
Sample
230609-fe6f6sbg41
-
MD5
9e3f7e522aea706281bf2f5fed06e726
-
SHA1
34d7a9d9e04e2493763f240778d4b025855bdf55
-
SHA256
f1e8c4d3c0ad964b781157e737ccc4367ac83bbbc6447897967ed323a2d32a0c
-
SHA512
6c10caef6cae14791ed12e0f2e8a7bf2945f4eb5bbcc0da6750147a020cbe5526ee369f970d45cbf348e6d4e049f200c32d906bdc2fb4fe01201cfc5ac9d2c89
-
SSDEEP
12288:AMr0y90ELZLMb4fn5LiEadLXvIULiDUZFGPa6a1JbZY2M:EynRMuadLjrGwlXM
Static task
static1
Behavioral task
behavioral1
Sample
f1e8c4d3c0ad964b781157e737ccc4367ac83bbbc6447897967ed323a2d32a0c.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
duha
83.97.73.129:19068
-
auth_value
aafe99874c3b8854069470882e00246c
Extracted
amadey
3.83
77.91.68.30/music/rock/index.php
Extracted
redline
crazy
83.97.73.129:19068
-
auth_value
66bc4d9682ea090eef64a299ece12fdd
Targets
-
-
Target
f1e8c4d3c0ad964b781157e737ccc4367ac83bbbc6447897967ed323a2d32a0c
-
Size
600KB
-
MD5
9e3f7e522aea706281bf2f5fed06e726
-
SHA1
34d7a9d9e04e2493763f240778d4b025855bdf55
-
SHA256
f1e8c4d3c0ad964b781157e737ccc4367ac83bbbc6447897967ed323a2d32a0c
-
SHA512
6c10caef6cae14791ed12e0f2e8a7bf2945f4eb5bbcc0da6750147a020cbe5526ee369f970d45cbf348e6d4e049f200c32d906bdc2fb4fe01201cfc5ac9d2c89
-
SSDEEP
12288:AMr0y90ELZLMb4fn5LiEadLXvIULiDUZFGPa6a1JbZY2M:EynRMuadLjrGwlXM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-