General
-
Target
977b4ecd455884eb6d1705d1d95abd8f6cb905727bb7942dceaad25de7e92110
-
Size
961KB
-
Sample
230320-nkngjsdc28
-
MD5
f6e5abad337c0ae6533e7da55954e538
-
SHA1
0132074c5d8d919f3f71f69260d8ef0d32af3bc5
-
SHA256
977b4ecd455884eb6d1705d1d95abd8f6cb905727bb7942dceaad25de7e92110
-
SHA512
2e34c61536e73bd2eaf1f7278fd1d27da89a6017922f081f00698b1a82060f93de2bc6c8c98184e83834f825ed9ab8e739566e98f23a598591f2bf9765d5a279
-
SSDEEP
24576:YyRZgeIWI4COwK5al8PyccrSiMW51amOl:fR+ZLrONvZcruW58mO
Static task
static1
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
977b4ecd455884eb6d1705d1d95abd8f6cb905727bb7942dceaad25de7e92110
-
Size
961KB
-
MD5
f6e5abad337c0ae6533e7da55954e538
-
SHA1
0132074c5d8d919f3f71f69260d8ef0d32af3bc5
-
SHA256
977b4ecd455884eb6d1705d1d95abd8f6cb905727bb7942dceaad25de7e92110
-
SHA512
2e34c61536e73bd2eaf1f7278fd1d27da89a6017922f081f00698b1a82060f93de2bc6c8c98184e83834f825ed9ab8e739566e98f23a598591f2bf9765d5a279
-
SSDEEP
24576:YyRZgeIWI4COwK5al8PyccrSiMW51amOl:fR+ZLrONvZcruW58mO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-