General
-
Target
75ef5497d1339265c85fd8eb0a8c216a9688ab81e4d1b33addc13b8d52008486
-
Size
1.0MB
-
Sample
230318-ytzlaaff9t
-
MD5
f1cba38d0639a825ceed975a1a81ebdd
-
SHA1
ebc13047a14442c2c5fd2fa37e2f257763148780
-
SHA256
75ef5497d1339265c85fd8eb0a8c216a9688ab81e4d1b33addc13b8d52008486
-
SHA512
f9c88a3caf96bb28c294c765c376904c90f4b3dce76dbe075f46ebcf06aec23c2fb37b91ea039d10ca6a65971087dac8f5e4722c2f322c7e9d66171b0cbdfaac
-
SSDEEP
24576:iy7sfrroueJ2BMhtC02WV7q4xCvCi/TmUfDRJ:JYfr8rJEVu7qJTmYt
Static task
static1
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
75ef5497d1339265c85fd8eb0a8c216a9688ab81e4d1b33addc13b8d52008486
-
Size
1.0MB
-
MD5
f1cba38d0639a825ceed975a1a81ebdd
-
SHA1
ebc13047a14442c2c5fd2fa37e2f257763148780
-
SHA256
75ef5497d1339265c85fd8eb0a8c216a9688ab81e4d1b33addc13b8d52008486
-
SHA512
f9c88a3caf96bb28c294c765c376904c90f4b3dce76dbe075f46ebcf06aec23c2fb37b91ea039d10ca6a65971087dac8f5e4722c2f322c7e9d66171b0cbdfaac
-
SSDEEP
24576:iy7sfrroueJ2BMhtC02WV7q4xCvCi/TmUfDRJ:JYfr8rJEVu7qJTmYt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-