General
-
Target
960cf637c58cdafbae513c2c3305b561761b138487d9e001fbff063f87bca0e4
-
Size
1006KB
-
Sample
230323-ry481agc86
-
MD5
4dc92e03905693d089c64eed8db43077
-
SHA1
5cbb05b7bb1d2e743593556e78f9e2219507c1bd
-
SHA256
960cf637c58cdafbae513c2c3305b561761b138487d9e001fbff063f87bca0e4
-
SHA512
1e4acdf7992a6518a96346cd2a449de964943979b454d886df172fdb233fb08b0a5dd9ab69d0df667d4486e304d108ec0ebe3a214bc8986bc33b2c38554cf4f6
-
SSDEEP
24576:py7K5uE6JQyilVcH2wwoQh/PN6oxEE9jPY+:c7K4E6J+lVEEXJF60VA
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
lown
193.233.20.31:4125
-
auth_value
4cf836e062bcdc2a4fdbf410f5747ec7
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
960cf637c58cdafbae513c2c3305b561761b138487d9e001fbff063f87bca0e4
-
Size
1006KB
-
MD5
4dc92e03905693d089c64eed8db43077
-
SHA1
5cbb05b7bb1d2e743593556e78f9e2219507c1bd
-
SHA256
960cf637c58cdafbae513c2c3305b561761b138487d9e001fbff063f87bca0e4
-
SHA512
1e4acdf7992a6518a96346cd2a449de964943979b454d886df172fdb233fb08b0a5dd9ab69d0df667d4486e304d108ec0ebe3a214bc8986bc33b2c38554cf4f6
-
SSDEEP
24576:py7K5uE6JQyilVcH2wwoQh/PN6oxEE9jPY+:c7K4E6J+lVEEXJF60VA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-