General
-
Target
24f26bc1b333bca56414dd4ae43a22b3baab663ad0faf87f765bb2e18b747253
-
Size
1007KB
-
Sample
230322-rc3s2sba9y
-
MD5
ca47d9a9d33a3c15d1d6a39143558085
-
SHA1
936d388db2dfe7d9951f2de2c5a3b0444c22921b
-
SHA256
24f26bc1b333bca56414dd4ae43a22b3baab663ad0faf87f765bb2e18b747253
-
SHA512
d935900407923eee19f61a49199bec218bbe91c2d9a08dc778bc348e54177fecea49dd682e0118c34db98e4b0d490678ccf23e7abd71026a945495885785421f
-
SSDEEP
24576:1yuGWwaCu+MV9ujSOWDuFFPWR2QeZ9I3A1RA2xYFyV:QFu+t+6ssvaYA2xT
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
sint
193.233.20.31:4125
-
auth_value
9d9b763b4dcfbff1c06ef4743cc0399e
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
24f26bc1b333bca56414dd4ae43a22b3baab663ad0faf87f765bb2e18b747253
-
Size
1007KB
-
MD5
ca47d9a9d33a3c15d1d6a39143558085
-
SHA1
936d388db2dfe7d9951f2de2c5a3b0444c22921b
-
SHA256
24f26bc1b333bca56414dd4ae43a22b3baab663ad0faf87f765bb2e18b747253
-
SHA512
d935900407923eee19f61a49199bec218bbe91c2d9a08dc778bc348e54177fecea49dd682e0118c34db98e4b0d490678ccf23e7abd71026a945495885785421f
-
SSDEEP
24576:1yuGWwaCu+MV9ujSOWDuFFPWR2QeZ9I3A1RA2xYFyV:QFu+t+6ssvaYA2xT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-