General
-
Target
ead67b6ebbf6b6d291927e355ed4f1aea09834d74ca6761a2bf911a33aafd481
-
Size
1.0MB
-
Sample
230327-prtsksfe3v
-
MD5
68d19e44162edff0e926ff35f2a52a79
-
SHA1
ea41ae72fd0dac3f7b9de6586d3b4b4669d6b16a
-
SHA256
ead67b6ebbf6b6d291927e355ed4f1aea09834d74ca6761a2bf911a33aafd481
-
SHA512
9186c2b61123734823b01fa9a2b2a56d5bef31e702513d1d03bc0e8553ad0047750fbff2ffdf2d565a901fc093757405d8f955528e361eb0cd80801f401a1a01
-
SSDEEP
24576:QyKKAyRYNtLH47QVk58utufg+0TqnpWjjuyYhBYHztHE:XKKAdfL6jUgnTT3hYfYTd
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
vila
193.233.20.33:4125
-
auth_value
94b115d79ddcab0a0fb9dfab8e225c3b
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
ead67b6ebbf6b6d291927e355ed4f1aea09834d74ca6761a2bf911a33aafd481
-
Size
1.0MB
-
MD5
68d19e44162edff0e926ff35f2a52a79
-
SHA1
ea41ae72fd0dac3f7b9de6586d3b4b4669d6b16a
-
SHA256
ead67b6ebbf6b6d291927e355ed4f1aea09834d74ca6761a2bf911a33aafd481
-
SHA512
9186c2b61123734823b01fa9a2b2a56d5bef31e702513d1d03bc0e8553ad0047750fbff2ffdf2d565a901fc093757405d8f955528e361eb0cd80801f401a1a01
-
SSDEEP
24576:QyKKAyRYNtLH47QVk58utufg+0TqnpWjjuyYhBYHztHE:XKKAdfL6jUgnTT3hYfYTd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-