General
-
Target
aaa60eb195c60960d550329ccd085def7adde9e6ebeb43cab2c41a5968b33926
-
Size
655KB
-
Sample
230316-2djfxafd2t
-
MD5
4d33058acba951173b7a764e12db629d
-
SHA1
44be8d49befcb00e048b501da6f69b1c0d638ba7
-
SHA256
aaa60eb195c60960d550329ccd085def7adde9e6ebeb43cab2c41a5968b33926
-
SHA512
bcea52260cd4b343684caec1d66f70506384255c9235a1038c39d4ca0ae9070fd799fb7c5650b274d3036265a0053dff20dc9b304cdadb90c157a8ea26b5ee82
-
SSDEEP
12288:4Mrby906AZyecHvr/Qx+DP6KajCkALFtvgrW95+nd/UjMWh/ny:zyBAIQMDP8jOXgrWL+nlUjMn
Static task
static1
Behavioral task
behavioral1
Sample
aaa60eb195c60960d550329ccd085def7adde9e6ebeb43cab2c41a5968b33926.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
lint
193.233.20.28:4125
-
auth_value
0e95262fb78243c67430f3148303e5b7
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
aaa60eb195c60960d550329ccd085def7adde9e6ebeb43cab2c41a5968b33926
-
Size
655KB
-
MD5
4d33058acba951173b7a764e12db629d
-
SHA1
44be8d49befcb00e048b501da6f69b1c0d638ba7
-
SHA256
aaa60eb195c60960d550329ccd085def7adde9e6ebeb43cab2c41a5968b33926
-
SHA512
bcea52260cd4b343684caec1d66f70506384255c9235a1038c39d4ca0ae9070fd799fb7c5650b274d3036265a0053dff20dc9b304cdadb90c157a8ea26b5ee82
-
SSDEEP
12288:4Mrby906AZyecHvr/Qx+DP6KajCkALFtvgrW95+nd/UjMWh/ny:zyBAIQMDP8jOXgrWL+nlUjMn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-