General
-
Target
47ddd14bbfb438bd63074de796ada7057c61790ed2cca4793cc8e26cce5d3124
-
Size
1001KB
-
Sample
230331-sg1d6aah56
-
MD5
fcde0f4d70f3211d89ea02ed18350893
-
SHA1
9353a2ca382a818827e65b1e4440c81a46babe52
-
SHA256
47ddd14bbfb438bd63074de796ada7057c61790ed2cca4793cc8e26cce5d3124
-
SHA512
425a37f46888a7488378f2d0bcbff1500d5135419f8cf0215b224e07e769fbcdecff593d6c4b0690bcb2736f21f672abdc998f86aa9c7d8a043f65581c1020d5
-
SSDEEP
12288:LMrny909x1l2NwISzLDFstta4RO/1wB4+ssK6leE6mVODzrBBW+kGunkFiWNhTTf:syulcw5utID1O75fKhB7WnkFdbT
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
lift
176.113.115.145:4125
-
auth_value
94f33c242a83de9dcc729e29ec435dfb
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
47ddd14bbfb438bd63074de796ada7057c61790ed2cca4793cc8e26cce5d3124
-
Size
1001KB
-
MD5
fcde0f4d70f3211d89ea02ed18350893
-
SHA1
9353a2ca382a818827e65b1e4440c81a46babe52
-
SHA256
47ddd14bbfb438bd63074de796ada7057c61790ed2cca4793cc8e26cce5d3124
-
SHA512
425a37f46888a7488378f2d0bcbff1500d5135419f8cf0215b224e07e769fbcdecff593d6c4b0690bcb2736f21f672abdc998f86aa9c7d8a043f65581c1020d5
-
SSDEEP
12288:LMrny909x1l2NwISzLDFstta4RO/1wB4+ssK6leE6mVODzrBBW+kGunkFiWNhTTf:syulcw5utID1O75fKhB7WnkFdbT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-