General
-
Target
a9b422eb0edca7685821cd5894bf0c85388b9b11abcf461d67a6c81f2cd305ee
-
Size
989KB
-
Sample
230330-hq44labd23
-
MD5
53d1d5c56c3e23917e9179ecd3a9b7fc
-
SHA1
5a109daab460b50061c4226153ca27857e7b3b00
-
SHA256
a9b422eb0edca7685821cd5894bf0c85388b9b11abcf461d67a6c81f2cd305ee
-
SHA512
15937bbfc2714a3eec16b26d0f44dd5ed1bd698b0b637706653a0d97b053d786b28aaf161524fcf438b1a7049c389281aae815c9c6a2dd1b7d71b97e8eca72b4
-
SSDEEP
24576:9yUcNTMVTKOry3K1zPsL3CnB9xWFO76CRsgdW:YhNkTXy69BWMd
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
legi
176.113.115.145:4125
-
auth_value
a8baa360c57439b7cfeb1dc01ff2a466
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
a9b422eb0edca7685821cd5894bf0c85388b9b11abcf461d67a6c81f2cd305ee
-
Size
989KB
-
MD5
53d1d5c56c3e23917e9179ecd3a9b7fc
-
SHA1
5a109daab460b50061c4226153ca27857e7b3b00
-
SHA256
a9b422eb0edca7685821cd5894bf0c85388b9b11abcf461d67a6c81f2cd305ee
-
SHA512
15937bbfc2714a3eec16b26d0f44dd5ed1bd698b0b637706653a0d97b053d786b28aaf161524fcf438b1a7049c389281aae815c9c6a2dd1b7d71b97e8eca72b4
-
SSDEEP
24576:9yUcNTMVTKOry3K1zPsL3CnB9xWFO76CRsgdW:YhNkTXy69BWMd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-