General
-
Target
63d5221aded75423c19646a31de24def8cb748b9fa6800b25afca307fbc638bc
-
Size
989KB
-
Sample
230328-31xsgsdh97
-
MD5
e93683ce5f314ae916baa7e644087034
-
SHA1
f5e13534a094889603300e0fa722edf7169ce50d
-
SHA256
63d5221aded75423c19646a31de24def8cb748b9fa6800b25afca307fbc638bc
-
SHA512
aecd5fd23b11b571c57fb8a4f94a2bc374cbb3567a766d3422c008b6710653f9bae4e3fe5fc2f74370c7d4ee82901d2f58b4be1bcbda2de85bfacab3993283f0
-
SSDEEP
24576:/yhYM9zaxU/6f/+h5kAn0oudldYco4f5Vg8EVVu/+3skGm:KhYGzRY+h5kVou9ToiVNEVVu/Cs
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nado
176.113.115.145:4125
-
auth_value
a648e365d8e0df895a84152ad68ffc56
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
63d5221aded75423c19646a31de24def8cb748b9fa6800b25afca307fbc638bc
-
Size
989KB
-
MD5
e93683ce5f314ae916baa7e644087034
-
SHA1
f5e13534a094889603300e0fa722edf7169ce50d
-
SHA256
63d5221aded75423c19646a31de24def8cb748b9fa6800b25afca307fbc638bc
-
SHA512
aecd5fd23b11b571c57fb8a4f94a2bc374cbb3567a766d3422c008b6710653f9bae4e3fe5fc2f74370c7d4ee82901d2f58b4be1bcbda2de85bfacab3993283f0
-
SSDEEP
24576:/yhYM9zaxU/6f/+h5kAn0oudldYco4f5Vg8EVVu/+3skGm:KhYGzRY+h5kVou9ToiVNEVVu/Cs
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-