General
-
Target
tmp
-
Size
798KB
-
Sample
230627-eyrlpada55
-
MD5
385a3b69f97c6ecd9e6c3ea16164b7fd
-
SHA1
dbcc1ae1a90cce1e5c13fee529022e602c2a65c9
-
SHA256
004228b35e1be31564d257d0d79ffaadadb58f5390535c8378ce7cab33bf8e25
-
SHA512
f6e6e300a9620d1d5440230765c3eb1c4a2a742a3188e28c21a1e7120e7e9e4052562c5460df2ee5a35d6c33568e011bdd7becd0336ee6d1ea2e854685bbf83b
-
SSDEEP
12288:CLF03zd8z1KI3v3Odoo+094iO8q9nNZHJitviMj4b6n7N:gF0ZQKI3WdHainUHJitqMjy6h
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
redline
mucha
83.97.73.131:19071
-
auth_value
5d76e123341992ecf110010eb89456f0
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Extracted
redline
smoke
83.97.73.131:19071
-
auth_value
aaa47198b84c95fcce9397339e8af9d4
Targets
-
-
Target
tmp
-
Size
798KB
-
MD5
385a3b69f97c6ecd9e6c3ea16164b7fd
-
SHA1
dbcc1ae1a90cce1e5c13fee529022e602c2a65c9
-
SHA256
004228b35e1be31564d257d0d79ffaadadb58f5390535c8378ce7cab33bf8e25
-
SHA512
f6e6e300a9620d1d5440230765c3eb1c4a2a742a3188e28c21a1e7120e7e9e4052562c5460df2ee5a35d6c33568e011bdd7becd0336ee6d1ea2e854685bbf83b
-
SSDEEP
12288:CLF03zd8z1KI3v3Odoo+094iO8q9nNZHJitviMj4b6n7N:gF0ZQKI3WdHainUHJitqMjy6h
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-