General
-
Target
aabfd0455537698a45225239fde6315b48ed5bba3e348e2f7ae5bcd68aee838d
-
Size
989KB
-
Sample
230330-hgjfjacg5w
-
MD5
e20c557d659eebc1e54ccf71719b2e81
-
SHA1
bbfc127fa571d072efcde8f9b19274998539422b
-
SHA256
aabfd0455537698a45225239fde6315b48ed5bba3e348e2f7ae5bcd68aee838d
-
SHA512
b0341b30feb94881ba73f0317b4a5a1f5466397d545b6c662203416c770713a5127ca3240123e7bc4da1f45f3b1c842ea462a139ebd08f6e49b7da19675618e8
-
SSDEEP
12288:dMrPy90HjVaBDFPtqUP+2QfVESs5SnPq219o7zOH+jX+1UdBDVJk22yb1ibuL9if:myOjVa9tmfOSs5MPqZ7aKdtjvwN1
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
legi
176.113.115.145:4125
-
auth_value
a8baa360c57439b7cfeb1dc01ff2a466
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
aabfd0455537698a45225239fde6315b48ed5bba3e348e2f7ae5bcd68aee838d
-
Size
989KB
-
MD5
e20c557d659eebc1e54ccf71719b2e81
-
SHA1
bbfc127fa571d072efcde8f9b19274998539422b
-
SHA256
aabfd0455537698a45225239fde6315b48ed5bba3e348e2f7ae5bcd68aee838d
-
SHA512
b0341b30feb94881ba73f0317b4a5a1f5466397d545b6c662203416c770713a5127ca3240123e7bc4da1f45f3b1c842ea462a139ebd08f6e49b7da19675618e8
-
SSDEEP
12288:dMrPy90HjVaBDFPtqUP+2QfVESs5SnPq219o7zOH+jX+1UdBDVJk22yb1ibuL9if:myOjVa9tmfOSs5MPqZ7aKdtjvwN1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-