General
-
Target
924e3bcdcbfb8678b0496f1a8b243a3d.bin
-
Size
676KB
-
Sample
230617-bxqffshf87
-
MD5
019b2c288237c6f9082201011a0209fa
-
SHA1
42376e54d16c01b0b834e8c77b55020482c7e5c2
-
SHA256
d3a6a584910eabf6ce92798fac11eebfe83b19b1709cc0d7bb1da527dbc2fb83
-
SHA512
5dde8b5e4f84879bee508c26a8df922e1943a00dd513768b9112aa119a8913db655a48be9c5ad8da8ccecb3f837ecc9914925b17984f4dc12574503d1b002e99
-
SSDEEP
12288:TkLwj5mG93MswSSi/RYo1LyAbfWlT49YkvxwVnCxp7b0qquW7glkmbVXVj2IiCLu:TAGEG9sSSi/O6LBKlT49Yk4nap7b0PLR
Static task
static1
Behavioral task
behavioral1
Sample
431aa78afc82171df3da959bceabdb4334cf1c0aabf26aea7b68fea62f9b2437.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
dana
83.97.73.130:19061
-
auth_value
da2d1691db653e49676d799e1eae2673
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
joker
83.97.73.130:19061
-
auth_value
a98d303cc28bb3b32a23c59214ae3bc0
Extracted
redline
dedo
83.97.73.130:19061
-
auth_value
ac76f7438fbe49011f900c651cb85e26
Extracted
redline
grega
83.97.73.130:19061
-
auth_value
16e2fbc2847b2270b3f0679e2dd76c8d
Targets
-
-
Target
431aa78afc82171df3da959bceabdb4334cf1c0aabf26aea7b68fea62f9b2437.exe
-
Size
720KB
-
MD5
924e3bcdcbfb8678b0496f1a8b243a3d
-
SHA1
df64fed2b15d0a106eda4d946d8b4123bea4cf88
-
SHA256
431aa78afc82171df3da959bceabdb4334cf1c0aabf26aea7b68fea62f9b2437
-
SHA512
7c73680884f70e7d0932f499cf934219b918a395021e44e9eeaad744bd1797a805cf54a378474c569154c0d56ff208aa96835eba4319509b6b164602989e961c
-
SSDEEP
12288:TMrty90LAClwI0i3b/xoxX8YC1NkvCsK2+g6Dpzn6jlBPRWLiLXldDPKqbL/h/:2y0XtotY1NrF2+Tb6/kLcl1fh/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-