General
-
Target
88eb21e3e4668432fb9e8d58ec022cd232a3e2f0b18e1b7dbe9a93ce3b264628
-
Size
1.0MB
-
Sample
230325-zrwbhsgd8z
-
MD5
54519be016067cec5658b49ec8c069f5
-
SHA1
bf1e6a0c2fcc14798372c8d44986ad1af7e2831f
-
SHA256
88eb21e3e4668432fb9e8d58ec022cd232a3e2f0b18e1b7dbe9a93ce3b264628
-
SHA512
f37b136347283be13bde5d7b561117e776a12aac23e08910c79afef58e325a47d298be54121c7aacdf8106e42f9ed9f49040c38c5ee38ae975d205f8370f8c30
-
SSDEEP
24576:GyjEFHjOhHrLjQtGPd84uEPG154W3WMmuu8wCDm:VQ01jQt4i4uEPG154WG1uu8wC
Static task
static1
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
store
193.233.20.32:4125
-
auth_value
e34e5836de4e256271ab56c648765bcd
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
88eb21e3e4668432fb9e8d58ec022cd232a3e2f0b18e1b7dbe9a93ce3b264628
-
Size
1.0MB
-
MD5
54519be016067cec5658b49ec8c069f5
-
SHA1
bf1e6a0c2fcc14798372c8d44986ad1af7e2831f
-
SHA256
88eb21e3e4668432fb9e8d58ec022cd232a3e2f0b18e1b7dbe9a93ce3b264628
-
SHA512
f37b136347283be13bde5d7b561117e776a12aac23e08910c79afef58e325a47d298be54121c7aacdf8106e42f9ed9f49040c38c5ee38ae975d205f8370f8c30
-
SSDEEP
24576:GyjEFHjOhHrLjQtGPd84uEPG154W3WMmuu8wCDm:VQ01jQt4i4uEPG154WG1uu8wC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-