General
-
Target
e308f818fd156d282bfc246b75c950bdf3d3b9fc2f27cc10676f370501469ee7
-
Size
1021KB
-
Sample
230323-xgcejshe58
-
MD5
e12c6ba29edb7c80f596e503e8475766
-
SHA1
bc28dfb982945b88f96a7931d167f8af45812459
-
SHA256
e308f818fd156d282bfc246b75c950bdf3d3b9fc2f27cc10676f370501469ee7
-
SHA512
b255561f37558e822cf51acaefd4639137359a8cfc5f931503d73629b0f9d94bc0f62cd41d2f0df5105daa76343f40f203fe8842201ef6a6aea1a7eaaeab5578
-
SSDEEP
24576:EySKcZBlRisjmGSBMH+niywLYKpOUD/H8uFQ+h:TZYisj0BXupOUD/c9
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
lown
193.233.20.31:4125
-
auth_value
4cf836e062bcdc2a4fdbf410f5747ec7
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
e308f818fd156d282bfc246b75c950bdf3d3b9fc2f27cc10676f370501469ee7
-
Size
1021KB
-
MD5
e12c6ba29edb7c80f596e503e8475766
-
SHA1
bc28dfb982945b88f96a7931d167f8af45812459
-
SHA256
e308f818fd156d282bfc246b75c950bdf3d3b9fc2f27cc10676f370501469ee7
-
SHA512
b255561f37558e822cf51acaefd4639137359a8cfc5f931503d73629b0f9d94bc0f62cd41d2f0df5105daa76343f40f203fe8842201ef6a6aea1a7eaaeab5578
-
SSDEEP
24576:EySKcZBlRisjmGSBMH+niywLYKpOUD/H8uFQ+h:TZYisj0BXupOUD/c9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-