General
-
Target
48e5bd721fe81ee8bbe3a8158cca398b193afff99aef647cc4ad8b48c51c5133
-
Size
1.0MB
-
Sample
230331-f5qhmsaa8z
-
MD5
28f9c8133c57f32c749f7c0888a9717e
-
SHA1
7959929ca28807703d5c885aedbe4ebad358e2d3
-
SHA256
48e5bd721fe81ee8bbe3a8158cca398b193afff99aef647cc4ad8b48c51c5133
-
SHA512
4cdbb986d24ade3827e8215529e9020e8fbd4f9d01ce61fce93dbc926cf56919c31726761a85084296f91f947238b227b9e2663cb3d6d8bbd1db1fed3f3a5302
-
SSDEEP
24576:Yy2maJS4W5Xji1r4zz+VEpBCZjoSGN28WMo87e:fwSl5Xu1r4zoyCZTKF
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
liba
176.113.115.145:4125
-
auth_value
1a62e130767ad862d1fb9d7ab0115025
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
48e5bd721fe81ee8bbe3a8158cca398b193afff99aef647cc4ad8b48c51c5133
-
Size
1.0MB
-
MD5
28f9c8133c57f32c749f7c0888a9717e
-
SHA1
7959929ca28807703d5c885aedbe4ebad358e2d3
-
SHA256
48e5bd721fe81ee8bbe3a8158cca398b193afff99aef647cc4ad8b48c51c5133
-
SHA512
4cdbb986d24ade3827e8215529e9020e8fbd4f9d01ce61fce93dbc926cf56919c31726761a85084296f91f947238b227b9e2663cb3d6d8bbd1db1fed3f3a5302
-
SSDEEP
24576:Yy2maJS4W5Xji1r4zz+VEpBCZjoSGN28WMo87e:fwSl5Xu1r4zoyCZTKF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-