General
-
Target
696c3cedbdaaef8be5d618947f7121b54c8187e539e6466910f84d8885f9df2c
-
Size
1005KB
-
Sample
230324-jyw9dsda74
-
MD5
935d8a71606dc954b665222aed4056e8
-
SHA1
80f5b5d66b535f17ea15cc2d0c9dcffb750d00b9
-
SHA256
696c3cedbdaaef8be5d618947f7121b54c8187e539e6466910f84d8885f9df2c
-
SHA512
3271d340fc1a0e2273c71b187a772aa2de0c087e3507a1629ab20ac5e25485ff22968d0667fe7f61846db081b41ea1a4abd00fa26da99e0bd2bed7fe0426b341
-
SSDEEP
24576:Ly9TGq2ltaU5wtinq/4qLZ3aVPmD8wHqkP0jF:+t+naU5vq4+1qkc
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
696c3cedbdaaef8be5d618947f7121b54c8187e539e6466910f84d8885f9df2c
-
Size
1005KB
-
MD5
935d8a71606dc954b665222aed4056e8
-
SHA1
80f5b5d66b535f17ea15cc2d0c9dcffb750d00b9
-
SHA256
696c3cedbdaaef8be5d618947f7121b54c8187e539e6466910f84d8885f9df2c
-
SHA512
3271d340fc1a0e2273c71b187a772aa2de0c087e3507a1629ab20ac5e25485ff22968d0667fe7f61846db081b41ea1a4abd00fa26da99e0bd2bed7fe0426b341
-
SSDEEP
24576:Ly9TGq2ltaU5wtinq/4qLZ3aVPmD8wHqkP0jF:+t+naU5vq4+1qkc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-