General
-
Target
cb3d7fe29fc55f920fa397efc78040f4cad672314474286f4d26cc4f522600ae
-
Size
1012KB
-
Sample
230324-pc1mkseb92
-
MD5
874375d1993064c71e69496464d71d94
-
SHA1
566c4e1bee09f117602f66db79d02374e381bde2
-
SHA256
cb3d7fe29fc55f920fa397efc78040f4cad672314474286f4d26cc4f522600ae
-
SHA512
fbf5a310f6ec14f4f0d0b333ff9426ce1ec2856cb37da111239fd03f06fa06ad9f7da4487e2245bee9802790fa09eb2ccf1a50dbbf191bc8a9e35536fcda53f0
-
SSDEEP
24576:YyKDpeof8/dQtAv1pLgChJuRdk+d82ef+ITBvpXg:fK1g/rv3P+azH1vB
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
goga
193.233.20.31:4125
-
auth_value
d23290cf37dcc5419576040359a72599
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
cb3d7fe29fc55f920fa397efc78040f4cad672314474286f4d26cc4f522600ae
-
Size
1012KB
-
MD5
874375d1993064c71e69496464d71d94
-
SHA1
566c4e1bee09f117602f66db79d02374e381bde2
-
SHA256
cb3d7fe29fc55f920fa397efc78040f4cad672314474286f4d26cc4f522600ae
-
SHA512
fbf5a310f6ec14f4f0d0b333ff9426ce1ec2856cb37da111239fd03f06fa06ad9f7da4487e2245bee9802790fa09eb2ccf1a50dbbf191bc8a9e35536fcda53f0
-
SSDEEP
24576:YyKDpeof8/dQtAv1pLgChJuRdk+d82ef+ITBvpXg:fK1g/rv3P+azH1vB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-