General
-
Target
c2f906e037628dab1c6196e5b73b503baf0d671a01d88f82362d6e9bb49fe443
-
Size
1013KB
-
Sample
230324-j2h6yafb7y
-
MD5
870c39a670b5c5c3ba9d545bd87a5b8c
-
SHA1
8c508d7ef6eb9dfb8e250205c2b0e58645c4ba8e
-
SHA256
c2f906e037628dab1c6196e5b73b503baf0d671a01d88f82362d6e9bb49fe443
-
SHA512
007112ca73d62c9bc17ad9639b17c8b4cb66a8bf9a2b662338c8fb3398ac16bb8c0b8db13601637368a9b30578e983d517eb0c2b6d421c2e058e836d36b4493a
-
SSDEEP
24576:ByL3WMmc3nEjYLtwvuTmxVJUuorjpvXewE0OmmWvwF:0LZmUEjYLSvuTy6kavw
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
c2f906e037628dab1c6196e5b73b503baf0d671a01d88f82362d6e9bb49fe443
-
Size
1013KB
-
MD5
870c39a670b5c5c3ba9d545bd87a5b8c
-
SHA1
8c508d7ef6eb9dfb8e250205c2b0e58645c4ba8e
-
SHA256
c2f906e037628dab1c6196e5b73b503baf0d671a01d88f82362d6e9bb49fe443
-
SHA512
007112ca73d62c9bc17ad9639b17c8b4cb66a8bf9a2b662338c8fb3398ac16bb8c0b8db13601637368a9b30578e983d517eb0c2b6d421c2e058e836d36b4493a
-
SSDEEP
24576:ByL3WMmc3nEjYLtwvuTmxVJUuorjpvXewE0OmmWvwF:0LZmUEjYLSvuTy6kavw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-