General
-
Target
f1d668903086130a05c2917ea255a33817562cb192450344bfeae363fb575017
-
Size
1000KB
-
Sample
230331-1pr2radg33
-
MD5
3f6ebbeffee284e0f0d9cf4141b60a21
-
SHA1
d4a1e692fd0545ec54c8f7b551063cd3aa020069
-
SHA256
f1d668903086130a05c2917ea255a33817562cb192450344bfeae363fb575017
-
SHA512
b3c791b53f01437d38f57b29c71c45fe59e21842b21eb3b3dab90011d4b725e3b08e9cc0ba3f78a6df1568d2d68890d043ad3608749febbd4ff34bb7f4788e9c
-
SSDEEP
24576:tysoZDAAEnTAHqLeoja9EIKbsz3jp6yE01TnsClXp:IsoZDAAIE6D+9vKbUzp601Tn/X
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
lift
176.113.115.145:4125
-
auth_value
94f33c242a83de9dcc729e29ec435dfb
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
f1d668903086130a05c2917ea255a33817562cb192450344bfeae363fb575017
-
Size
1000KB
-
MD5
3f6ebbeffee284e0f0d9cf4141b60a21
-
SHA1
d4a1e692fd0545ec54c8f7b551063cd3aa020069
-
SHA256
f1d668903086130a05c2917ea255a33817562cb192450344bfeae363fb575017
-
SHA512
b3c791b53f01437d38f57b29c71c45fe59e21842b21eb3b3dab90011d4b725e3b08e9cc0ba3f78a6df1568d2d68890d043ad3608749febbd4ff34bb7f4788e9c
-
SSDEEP
24576:tysoZDAAEnTAHqLeoja9EIKbsz3jp6yE01TnsClXp:IsoZDAAIE6D+9vKbUzp601Tn/X
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-