General
-
Target
561069b08f94fc513487594a808d323bd884829b52a343cf3a2d963699a50841
-
Size
1020KB
-
Sample
230323-x6hmvshf79
-
MD5
1130ac29baa9062eaafef8fb00945744
-
SHA1
886a27a00f21b1d3c505eefcaea89b48658ba527
-
SHA256
561069b08f94fc513487594a808d323bd884829b52a343cf3a2d963699a50841
-
SHA512
bb50506f44c51f154e27d4266572fe157f4db2d6e9525959bce3c3afcb184df5509a8fb4af6c2a9022717bab1394e1504a12e4e16f2bdd65bef70feec218a808
-
SSDEEP
24576:uy9sO9ED+GHq4/e9InMOuqTI/b8lx1ebMd+d:99sO9EBHqweGMuTI/o/1eQd
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
lown
193.233.20.31:4125
-
auth_value
4cf836e062bcdc2a4fdbf410f5747ec7
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
561069b08f94fc513487594a808d323bd884829b52a343cf3a2d963699a50841
-
Size
1020KB
-
MD5
1130ac29baa9062eaafef8fb00945744
-
SHA1
886a27a00f21b1d3c505eefcaea89b48658ba527
-
SHA256
561069b08f94fc513487594a808d323bd884829b52a343cf3a2d963699a50841
-
SHA512
bb50506f44c51f154e27d4266572fe157f4db2d6e9525959bce3c3afcb184df5509a8fb4af6c2a9022717bab1394e1504a12e4e16f2bdd65bef70feec218a808
-
SSDEEP
24576:uy9sO9ED+GHq4/e9InMOuqTI/b8lx1ebMd+d:99sO9EBHqweGMuTI/o/1eQd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-