General
-
Target
ed434e4d394a4447d209b97cccd98eaed9e7a3468ad9f945eac7768e67ef67a3
-
Size
656KB
-
Sample
230317-b346ssdg23
-
MD5
85559b6e8036a4813bbebdd9b9959153
-
SHA1
5ddb986eb22f589b935dead91cb6383a3732b235
-
SHA256
ed434e4d394a4447d209b97cccd98eaed9e7a3468ad9f945eac7768e67ef67a3
-
SHA512
e43e18a2f3e6303a2e48fecc5121da7fd6848a2a6a7ee3e62045f7ca69a91dde77b1ec377b0e739157363a06dd399f36708b9b5fde9594143ad957a05e5dc323
-
SSDEEP
12288:3Mrly90T+kBwbWBIeOoOiUGLMRRM7/ebd3LmymGww8Q6:qyUBwbWBlOoFORVLSBwZ6
Static task
static1
Behavioral task
behavioral1
Sample
ed434e4d394a4447d209b97cccd98eaed9e7a3468ad9f945eac7768e67ef67a3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lint
193.233.20.28:4125
-
auth_value
0e95262fb78243c67430f3148303e5b7
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
ed434e4d394a4447d209b97cccd98eaed9e7a3468ad9f945eac7768e67ef67a3
-
Size
656KB
-
MD5
85559b6e8036a4813bbebdd9b9959153
-
SHA1
5ddb986eb22f589b935dead91cb6383a3732b235
-
SHA256
ed434e4d394a4447d209b97cccd98eaed9e7a3468ad9f945eac7768e67ef67a3
-
SHA512
e43e18a2f3e6303a2e48fecc5121da7fd6848a2a6a7ee3e62045f7ca69a91dde77b1ec377b0e739157363a06dd399f36708b9b5fde9594143ad957a05e5dc323
-
SSDEEP
12288:3Mrly90T+kBwbWBIeOoOiUGLMRRM7/ebd3LmymGww8Q6:qyUBwbWBlOoFORVLSBwZ6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-