General
-
Target
043b79fd260be8315bf67355eefb752cf9055d741ac2f893acedf8e13d1e6e1a
-
Size
1013KB
-
Sample
230324-ht7nwscg84
-
MD5
31569f05491d2a902cceb6a1cf145922
-
SHA1
e34b0c362a8f39c57d398eabf8921e5f47e71f3a
-
SHA256
043b79fd260be8315bf67355eefb752cf9055d741ac2f893acedf8e13d1e6e1a
-
SHA512
3b906d06de0d62a5eb194112702b4271b0d91b28a065cc72f5e74300c2e3ea2b358e9ad1b8b33b02abc42f36194e2db36ea4013f2d164875d50c43611f6650c3
-
SSDEEP
24576:SyUhSjnUlFV84Sux0qzA7D6Z2B+KX3KR4qSPKosAxgzwoUyh8rMbBC:5UMUPDR0qk7mUBESzxgzwm3N
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
043b79fd260be8315bf67355eefb752cf9055d741ac2f893acedf8e13d1e6e1a
-
Size
1013KB
-
MD5
31569f05491d2a902cceb6a1cf145922
-
SHA1
e34b0c362a8f39c57d398eabf8921e5f47e71f3a
-
SHA256
043b79fd260be8315bf67355eefb752cf9055d741ac2f893acedf8e13d1e6e1a
-
SHA512
3b906d06de0d62a5eb194112702b4271b0d91b28a065cc72f5e74300c2e3ea2b358e9ad1b8b33b02abc42f36194e2db36ea4013f2d164875d50c43611f6650c3
-
SSDEEP
24576:SyUhSjnUlFV84Sux0qzA7D6Z2B+KX3KR4qSPKosAxgzwoUyh8rMbBC:5UMUPDR0qk7mUBESzxgzwm3N
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-