General
-
Target
e8ff54892734b7dff4bec7797cc981412008273af33477366a7a9742a28cd4c5
-
Size
991KB
-
Sample
230330-kg9c3adc5v
-
MD5
43f897caa9fbbb72fd465ef4800f5f85
-
SHA1
3c88581d22c559c0565161093c15e3ccec73c28b
-
SHA256
e8ff54892734b7dff4bec7797cc981412008273af33477366a7a9742a28cd4c5
-
SHA512
73d2318f1263f0709b55234b392753fbb00b45b4f92e6e0c78f84d1634f6a22e717478321f987485d80798697b5d2c4b50672d3490b1f49a2adef5742b479b05
-
SSDEEP
24576:fyRnX6J5eHZu6iCjIroP+QtbN3r/A7908pYjsvqOiBO:qRXqJZCssmQtbNUeWYovq1
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
legi
176.113.115.145:4125
-
auth_value
a8baa360c57439b7cfeb1dc01ff2a466
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
e8ff54892734b7dff4bec7797cc981412008273af33477366a7a9742a28cd4c5
-
Size
991KB
-
MD5
43f897caa9fbbb72fd465ef4800f5f85
-
SHA1
3c88581d22c559c0565161093c15e3ccec73c28b
-
SHA256
e8ff54892734b7dff4bec7797cc981412008273af33477366a7a9742a28cd4c5
-
SHA512
73d2318f1263f0709b55234b392753fbb00b45b4f92e6e0c78f84d1634f6a22e717478321f987485d80798697b5d2c4b50672d3490b1f49a2adef5742b479b05
-
SSDEEP
24576:fyRnX6J5eHZu6iCjIroP+QtbN3r/A7908pYjsvqOiBO:qRXqJZCssmQtbNUeWYovq1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-