General
-
Target
bc1cc042c59a5a16900a73cddc290ff785ecd1b54b352db505e659de652bed3e
-
Size
1.0MB
-
Sample
230331-kzcf2shb46
-
MD5
2edbb5528e366b44ba09de726a46d017
-
SHA1
aefc5e57c4f5e447a56a7109b5bf1c0996c41daf
-
SHA256
bc1cc042c59a5a16900a73cddc290ff785ecd1b54b352db505e659de652bed3e
-
SHA512
933bc9227fa73f88bee2cae4e866e0adeea93f04d55d4b4bc1e54694d4a0e534b1ff2362cbbc7f7b89a353eb7367ffd86cc2c2bcb71e036b3fd5442084de2ce7
-
SSDEEP
24576:ey1SdjJPp/sj3f3wzbK8LknTrtRLT+c1f4ksCdwuhED:tyjJR/GP3wNk3Xfn13
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
liba
176.113.115.145:4125
-
auth_value
1a62e130767ad862d1fb9d7ab0115025
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
bc1cc042c59a5a16900a73cddc290ff785ecd1b54b352db505e659de652bed3e
-
Size
1.0MB
-
MD5
2edbb5528e366b44ba09de726a46d017
-
SHA1
aefc5e57c4f5e447a56a7109b5bf1c0996c41daf
-
SHA256
bc1cc042c59a5a16900a73cddc290ff785ecd1b54b352db505e659de652bed3e
-
SHA512
933bc9227fa73f88bee2cae4e866e0adeea93f04d55d4b4bc1e54694d4a0e534b1ff2362cbbc7f7b89a353eb7367ffd86cc2c2bcb71e036b3fd5442084de2ce7
-
SSDEEP
24576:ey1SdjJPp/sj3f3wzbK8LknTrtRLT+c1f4ksCdwuhED:tyjJR/GP3wNk3Xfn13
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-