General
-
Target
51cd9b8c6ab2dc4a790d5cbfde09e24c19b1c73e48348d3f11edbb4ddd99905e
-
Size
1.0MB
-
Sample
230328-1thzmsde74
-
MD5
b23b53ca8b84d42663b26e443f230f77
-
SHA1
444291c4afc8aed011d86ac5f0dad018d0b952bd
-
SHA256
51cd9b8c6ab2dc4a790d5cbfde09e24c19b1c73e48348d3f11edbb4ddd99905e
-
SHA512
115d2dbab5173dab8ec6fef5fb889d21d77fffc987f4b5dd7c7d033bf93437c4b539372aef58eeb29a179c9a4d2eafe4d2186856559724996ffe80265f7252b1
-
SSDEEP
24576:9yP4XVZc8wjC9FsSIzVK+m2xyHQa2tIbiuOmgU:YP4XVZc8wjlrzVKZ27a2tGvTg
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nado
176.113.115.145:4125
-
auth_value
a648e365d8e0df895a84152ad68ffc56
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
aurora
212.87.204.93:8081
Targets
-
-
Target
51cd9b8c6ab2dc4a790d5cbfde09e24c19b1c73e48348d3f11edbb4ddd99905e
-
Size
1.0MB
-
MD5
b23b53ca8b84d42663b26e443f230f77
-
SHA1
444291c4afc8aed011d86ac5f0dad018d0b952bd
-
SHA256
51cd9b8c6ab2dc4a790d5cbfde09e24c19b1c73e48348d3f11edbb4ddd99905e
-
SHA512
115d2dbab5173dab8ec6fef5fb889d21d77fffc987f4b5dd7c7d033bf93437c4b539372aef58eeb29a179c9a4d2eafe4d2186856559724996ffe80265f7252b1
-
SSDEEP
24576:9yP4XVZc8wjC9FsSIzVK+m2xyHQa2tIbiuOmgU:YP4XVZc8wjlrzVKZ27a2tGvTg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-