General
-
Target
b901ac25e8894184202b90a8bd0abf81efac92af30eebecbdc7a91f0f224261d
-
Size
1021KB
-
Sample
230323-x3xmlsbf3y
-
MD5
aa1e7f801f08ec32e8925d112be12f60
-
SHA1
1df93b8dc1172b5824fbd75ff0e5da8f34ce64b0
-
SHA256
b901ac25e8894184202b90a8bd0abf81efac92af30eebecbdc7a91f0f224261d
-
SHA512
12c9d3bfd34f9fabcd602524e07d9517587ec055c16eb4f01ab8bc670e8ecbeba23f84330f8b15390840c1f2b24da8fc39dcfeebc9a88fc8326a1aa4c14a962d
-
SSDEEP
24576:ky9OrLpk7l9zzkJbq2i6Ouy/e8MvnQX4:z9OrLKZ6bq2i6By/h2Q
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
lown
193.233.20.31:4125
-
auth_value
4cf836e062bcdc2a4fdbf410f5747ec7
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
b901ac25e8894184202b90a8bd0abf81efac92af30eebecbdc7a91f0f224261d
-
Size
1021KB
-
MD5
aa1e7f801f08ec32e8925d112be12f60
-
SHA1
1df93b8dc1172b5824fbd75ff0e5da8f34ce64b0
-
SHA256
b901ac25e8894184202b90a8bd0abf81efac92af30eebecbdc7a91f0f224261d
-
SHA512
12c9d3bfd34f9fabcd602524e07d9517587ec055c16eb4f01ab8bc670e8ecbeba23f84330f8b15390840c1f2b24da8fc39dcfeebc9a88fc8326a1aa4c14a962d
-
SSDEEP
24576:ky9OrLpk7l9zzkJbq2i6Ouy/e8MvnQX4:z9OrLKZ6bq2i6By/h2Q
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-