General
-
Target
d1c2e6a28e9ab21d5a79774fc77df92f620e29eabdd05bc80056b8bb4bb8d36e
-
Size
1.0MB
-
Sample
230327-pdpxgadd29
-
MD5
a0c9dfd8b7f207bec313149f03a2d7fd
-
SHA1
73bcd466ffbb99ad970eefdab93689672952430a
-
SHA256
d1c2e6a28e9ab21d5a79774fc77df92f620e29eabdd05bc80056b8bb4bb8d36e
-
SHA512
70d87a8beb38476badeaefade5ae823154e6ef0fd6989c592d7c410a9dac9e9b8cbb20c8298f82939c180207f1675c8b4ead7d77db76202e2bc097bf00f94bc3
-
SSDEEP
24576:QydyeoB56tTsL5Iy92pxaQ0l06OjVIDUEmUXv/HIdAOQnn:XdqHuxV0aRII4gon
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
vila
193.233.20.33:4125
-
auth_value
94b115d79ddcab0a0fb9dfab8e225c3b
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
d1c2e6a28e9ab21d5a79774fc77df92f620e29eabdd05bc80056b8bb4bb8d36e
-
Size
1.0MB
-
MD5
a0c9dfd8b7f207bec313149f03a2d7fd
-
SHA1
73bcd466ffbb99ad970eefdab93689672952430a
-
SHA256
d1c2e6a28e9ab21d5a79774fc77df92f620e29eabdd05bc80056b8bb4bb8d36e
-
SHA512
70d87a8beb38476badeaefade5ae823154e6ef0fd6989c592d7c410a9dac9e9b8cbb20c8298f82939c180207f1675c8b4ead7d77db76202e2bc097bf00f94bc3
-
SSDEEP
24576:QydyeoB56tTsL5Iy92pxaQ0l06OjVIDUEmUXv/HIdAOQnn:XdqHuxV0aRII4gon
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-