General
-
Target
011b0270c4a24aec8dd5a81ec8f7a792d87545a9645a6ea28eb50d902c74f33b
-
Size
1024KB
-
Sample
230322-dzbfesgf2s
-
MD5
2fc5571e8f291c37b2757f34047d51bf
-
SHA1
6f2d5d0897017b4942d013b908e44c5d809fe96c
-
SHA256
011b0270c4a24aec8dd5a81ec8f7a792d87545a9645a6ea28eb50d902c74f33b
-
SHA512
614dd0c05429715bda1fe06b6bd46dedac09b71a98659cb260dd4a7e5245f538ad14616191f3eec6580f24814a895b0930e0dfc369e8048b45c3ea4fd5d7dbcd
-
SSDEEP
24576:Jyh5e/vcaxoqoEhwqlpFGOYxHt6eVtZx4lFw/6M9ch4gEWicn7KK:8h5e/vcaxloEhwqTF+VtrPZxCE6M2h46
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
sint
193.233.20.31:4125
-
auth_value
9d9b763b4dcfbff1c06ef4743cc0399e
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
011b0270c4a24aec8dd5a81ec8f7a792d87545a9645a6ea28eb50d902c74f33b
-
Size
1024KB
-
MD5
2fc5571e8f291c37b2757f34047d51bf
-
SHA1
6f2d5d0897017b4942d013b908e44c5d809fe96c
-
SHA256
011b0270c4a24aec8dd5a81ec8f7a792d87545a9645a6ea28eb50d902c74f33b
-
SHA512
614dd0c05429715bda1fe06b6bd46dedac09b71a98659cb260dd4a7e5245f538ad14616191f3eec6580f24814a895b0930e0dfc369e8048b45c3ea4fd5d7dbcd
-
SSDEEP
24576:Jyh5e/vcaxoqoEhwqlpFGOYxHt6eVtZx4lFw/6M9ch4gEWicn7KK:8h5e/vcaxloEhwqTF+VtrPZxCE6M2h46
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-