General
-
Target
4cf30e686ebf453c1222ca0e1ad69f5f970229fbb4f23ccf2f8ecb8b6eb26a48
-
Size
1.0MB
-
Sample
230324-ewppbacb42
-
MD5
1cbea0a9fa6ebf22b51e43f512443c2d
-
SHA1
8203104eba330ce465e127c5e683b06392fda3fd
-
SHA256
4cf30e686ebf453c1222ca0e1ad69f5f970229fbb4f23ccf2f8ecb8b6eb26a48
-
SHA512
d97156efb68eed64032b6ef34e623c554ac5c19558277d4209805950d285356e3f8badc4e5d47a1eca6f04dfd36245c8cc1f96b0ebf6aca5dd9db1274260598c
-
SSDEEP
12288:8Mr6y90gpXZ9u1OnjifOTHtJNwq9XUmK9bTuxfO929wgovZGQjayMbLR6O8jqYM:Gyv9ZE1OnjifctZ9XmbTY294ZaDWbLd
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
aurora
212.87.204.93:8081
Targets
-
-
Target
4cf30e686ebf453c1222ca0e1ad69f5f970229fbb4f23ccf2f8ecb8b6eb26a48
-
Size
1.0MB
-
MD5
1cbea0a9fa6ebf22b51e43f512443c2d
-
SHA1
8203104eba330ce465e127c5e683b06392fda3fd
-
SHA256
4cf30e686ebf453c1222ca0e1ad69f5f970229fbb4f23ccf2f8ecb8b6eb26a48
-
SHA512
d97156efb68eed64032b6ef34e623c554ac5c19558277d4209805950d285356e3f8badc4e5d47a1eca6f04dfd36245c8cc1f96b0ebf6aca5dd9db1274260598c
-
SSDEEP
12288:8Mr6y90gpXZ9u1OnjifOTHtJNwq9XUmK9bTuxfO929wgovZGQjayMbLR6O8jqYM:Gyv9ZE1OnjifctZ9XmbTY294ZaDWbLd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-