General
-
Target
b4e23160795c0e312863cacf0c9c129a3c74a13f4335634d97b6979690195e41
-
Size
1013KB
-
Sample
230323-f58dfsff6z
-
MD5
c7c135fe4c72356cb428dbab9c51256f
-
SHA1
8feb57266bb534fa904574802d4f3cf5f54984cb
-
SHA256
b4e23160795c0e312863cacf0c9c129a3c74a13f4335634d97b6979690195e41
-
SHA512
c38c8f9be3b826d37916aa0faa23e5b2fe41a88fefbaf88fd44c713cb73590accf7384e70e290faf61475a6790d1ffc18b0e4ef940ee8bdbba7af44a353d0c02
-
SSDEEP
24576:ryiltL5l8e/RMqdTyJcrHXHAisQMGSwX7YS:eiltLSqh4CXn7
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
lown
193.233.20.31:4125
-
auth_value
4cf836e062bcdc2a4fdbf410f5747ec7
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
b4e23160795c0e312863cacf0c9c129a3c74a13f4335634d97b6979690195e41
-
Size
1013KB
-
MD5
c7c135fe4c72356cb428dbab9c51256f
-
SHA1
8feb57266bb534fa904574802d4f3cf5f54984cb
-
SHA256
b4e23160795c0e312863cacf0c9c129a3c74a13f4335634d97b6979690195e41
-
SHA512
c38c8f9be3b826d37916aa0faa23e5b2fe41a88fefbaf88fd44c713cb73590accf7384e70e290faf61475a6790d1ffc18b0e4ef940ee8bdbba7af44a353d0c02
-
SSDEEP
24576:ryiltL5l8e/RMqdTyJcrHXHAisQMGSwX7YS:eiltLSqh4CXn7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-