General
-
Target
6d2df3c01407317388b8862c2be7f5fbf88780ce84c11a919b2174e7656e5e8e
-
Size
988KB
-
Sample
230329-ctw99sgb4v
-
MD5
193347dcbe6c9516c3abb847a8905f58
-
SHA1
848ddc02df01100172f031469c703992b79708be
-
SHA256
6d2df3c01407317388b8862c2be7f5fbf88780ce84c11a919b2174e7656e5e8e
-
SHA512
6a6e543548f949c93f4bc4d683f0c633c26403301539a97ac1f36c3a1b16fe54882dcacb9cc812aad6f507e2ed0e9b80aa1be1bcaefc62af66466e5d5a035717
-
SSDEEP
24576:UykwNx3xIHqHGOh7pAF04Y9keTghq7eQC:jkSSqmOhF/4+kiWfQ
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nado
176.113.115.145:4125
-
auth_value
a648e365d8e0df895a84152ad68ffc56
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
6d2df3c01407317388b8862c2be7f5fbf88780ce84c11a919b2174e7656e5e8e
-
Size
988KB
-
MD5
193347dcbe6c9516c3abb847a8905f58
-
SHA1
848ddc02df01100172f031469c703992b79708be
-
SHA256
6d2df3c01407317388b8862c2be7f5fbf88780ce84c11a919b2174e7656e5e8e
-
SHA512
6a6e543548f949c93f4bc4d683f0c633c26403301539a97ac1f36c3a1b16fe54882dcacb9cc812aad6f507e2ed0e9b80aa1be1bcaefc62af66466e5d5a035717
-
SSDEEP
24576:UykwNx3xIHqHGOh7pAF04Y9keTghq7eQC:jkSSqmOhF/4+kiWfQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-