General
-
Target
532f7b6c188f9c78024909f1d4c76b97745effda2cd3e48d279763a0a89933d7
-
Size
1.0MB
-
Sample
230326-lbcmksaa5w
-
MD5
c0316044fa96f036df927e7ce336dce5
-
SHA1
6bcbf2d296e1e4a68e556ffa395c0027d2deae98
-
SHA256
532f7b6c188f9c78024909f1d4c76b97745effda2cd3e48d279763a0a89933d7
-
SHA512
d42f4511ce66ffa5386a5e5a163328a11329e0b71256b10a481fa389e3bff5df2d2e12f2cd522bd8c3e9d8a43e617f9e1bd0207c74334bf402a7002fe7684574
-
SSDEEP
24576:zy3jLWS4yAPhfJxvPUyfwuDU76i5acqeshYWBBjW:GnWZBxEyYuDWRaczRg
Static task
static1
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
netu
193.233.20.32:4125
-
auth_value
9641925ae487005582b5cf30476dd305
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
532f7b6c188f9c78024909f1d4c76b97745effda2cd3e48d279763a0a89933d7
-
Size
1.0MB
-
MD5
c0316044fa96f036df927e7ce336dce5
-
SHA1
6bcbf2d296e1e4a68e556ffa395c0027d2deae98
-
SHA256
532f7b6c188f9c78024909f1d4c76b97745effda2cd3e48d279763a0a89933d7
-
SHA512
d42f4511ce66ffa5386a5e5a163328a11329e0b71256b10a481fa389e3bff5df2d2e12f2cd522bd8c3e9d8a43e617f9e1bd0207c74334bf402a7002fe7684574
-
SSDEEP
24576:zy3jLWS4yAPhfJxvPUyfwuDU76i5acqeshYWBBjW:GnWZBxEyYuDWRaczRg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-