General
-
Target
510fbd94b021efb0baa4ececcf8db86a7e8f04871a20244708faefad46c0cc96
-
Size
1017KB
-
Sample
230327-qhj3fsff51
-
MD5
86991c0be2ad2468ae074772c63da698
-
SHA1
f9edc8815156066808ab7d6a694b6bad6e0bdad9
-
SHA256
510fbd94b021efb0baa4ececcf8db86a7e8f04871a20244708faefad46c0cc96
-
SHA512
4e92f85c594e20447bd8bf17660d7b63a61f47404eb8585b56baa851cec2ec25c93b01c5715c809467fa5e241ffcd2e6f2aac85416512ac9e66ff0666396d8ca
-
SSDEEP
24576:nyMHWnWrgFFTzPRnTvjrgieMSHgoIQCkib+d:yMHWWrQFTrRnTvjM5TIdg
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
vila
193.233.20.33:4125
-
auth_value
94b115d79ddcab0a0fb9dfab8e225c3b
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
510fbd94b021efb0baa4ececcf8db86a7e8f04871a20244708faefad46c0cc96
-
Size
1017KB
-
MD5
86991c0be2ad2468ae074772c63da698
-
SHA1
f9edc8815156066808ab7d6a694b6bad6e0bdad9
-
SHA256
510fbd94b021efb0baa4ececcf8db86a7e8f04871a20244708faefad46c0cc96
-
SHA512
4e92f85c594e20447bd8bf17660d7b63a61f47404eb8585b56baa851cec2ec25c93b01c5715c809467fa5e241ffcd2e6f2aac85416512ac9e66ff0666396d8ca
-
SSDEEP
24576:nyMHWnWrgFFTzPRnTvjrgieMSHgoIQCkib+d:yMHWWrQFTrRnTvjM5TIdg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-