General
-
Target
535b85fe7309e27a80667f74ebe6bcbc4ee7b56aebd48cd7f82be2cd05260d8f
-
Size
1001KB
-
Sample
230320-ds6mzsbf22
-
MD5
50a7674d1eeff03e6171b18b5c27c2be
-
SHA1
4952d8761cdd0a9295b8d152bc46df292a25b702
-
SHA256
535b85fe7309e27a80667f74ebe6bcbc4ee7b56aebd48cd7f82be2cd05260d8f
-
SHA512
f9991facfec88c65383bb8be5078be8a03e345c8d8850bb6596d7b860af40e06e7d3ed6268964d14d04bf5f54ffc675c253c67be3c0355c734c1103459114a23
-
SSDEEP
24576:CySxRBzetCBChHoRn3WCXzNxU8onwkzCIsnITA:p+itCAHYMjCI
Static task
static1
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
535b85fe7309e27a80667f74ebe6bcbc4ee7b56aebd48cd7f82be2cd05260d8f
-
Size
1001KB
-
MD5
50a7674d1eeff03e6171b18b5c27c2be
-
SHA1
4952d8761cdd0a9295b8d152bc46df292a25b702
-
SHA256
535b85fe7309e27a80667f74ebe6bcbc4ee7b56aebd48cd7f82be2cd05260d8f
-
SHA512
f9991facfec88c65383bb8be5078be8a03e345c8d8850bb6596d7b860af40e06e7d3ed6268964d14d04bf5f54ffc675c253c67be3c0355c734c1103459114a23
-
SSDEEP
24576:CySxRBzetCBChHoRn3WCXzNxU8onwkzCIsnITA:p+itCAHYMjCI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-