General
-
Target
a24d520679307aeee3307646d4c40f7c914432681a04510e4c6fac3d667b71b5
-
Size
1.0MB
-
Sample
230331-m77chahd43
-
MD5
a75b1a4b3563725bd02c34457696852a
-
SHA1
568e54fcf4a5ba364eb577d7c5f4a5dc2bf520aa
-
SHA256
a24d520679307aeee3307646d4c40f7c914432681a04510e4c6fac3d667b71b5
-
SHA512
d2f9dc42150db00df0a95969344da0a1410f4939a5c43426e39fa5e213b4e03ab5976809249300c4fa8a0f5f13f1a66f10f1fc83ef3446d4eeb84a3ad3653af1
-
SSDEEP
24576:4y6o3rjAZlJrQW2FPTkYXXUVZdcLuItSLvP9DHs:/N3rjEJoF7ke8gLYp
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
lift
176.113.115.145:4125
-
auth_value
94f33c242a83de9dcc729e29ec435dfb
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
a24d520679307aeee3307646d4c40f7c914432681a04510e4c6fac3d667b71b5
-
Size
1.0MB
-
MD5
a75b1a4b3563725bd02c34457696852a
-
SHA1
568e54fcf4a5ba364eb577d7c5f4a5dc2bf520aa
-
SHA256
a24d520679307aeee3307646d4c40f7c914432681a04510e4c6fac3d667b71b5
-
SHA512
d2f9dc42150db00df0a95969344da0a1410f4939a5c43426e39fa5e213b4e03ab5976809249300c4fa8a0f5f13f1a66f10f1fc83ef3446d4eeb84a3ad3653af1
-
SSDEEP
24576:4y6o3rjAZlJrQW2FPTkYXXUVZdcLuItSLvP9DHs:/N3rjEJoF7ke8gLYp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-