General
-
Target
b6d2b4ac56eec070b7c9981cb89ab8d5fcd66a5d8a451037e99122b288b57f3a
-
Size
1002KB
-
Sample
230401-ajbjpsfh9y
-
MD5
97b42501ef015e38da709b5c39f515e4
-
SHA1
436a2e647efa0a4b0908407e59805378686d8448
-
SHA256
b6d2b4ac56eec070b7c9981cb89ab8d5fcd66a5d8a451037e99122b288b57f3a
-
SHA512
17d5c03f9bf4bb232744262bb06e76fc4b2dc7305ccbe8b0b881880c3497eaf7d2b98bec832901745193e3d1140a7f9b8a642bbebccab80288c0a176ec531adf
-
SSDEEP
24576:syehs8BlmSYWfLQswZFsW4LVknPqE9kRCwzIZo8tvHEtk:beh7BlXDQ5FUswao8BEt
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
lift
176.113.115.145:4125
-
auth_value
94f33c242a83de9dcc729e29ec435dfb
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Extracted
aurora
212.87.204.93:8081
Targets
-
-
Target
b6d2b4ac56eec070b7c9981cb89ab8d5fcd66a5d8a451037e99122b288b57f3a
-
Size
1002KB
-
MD5
97b42501ef015e38da709b5c39f515e4
-
SHA1
436a2e647efa0a4b0908407e59805378686d8448
-
SHA256
b6d2b4ac56eec070b7c9981cb89ab8d5fcd66a5d8a451037e99122b288b57f3a
-
SHA512
17d5c03f9bf4bb232744262bb06e76fc4b2dc7305ccbe8b0b881880c3497eaf7d2b98bec832901745193e3d1140a7f9b8a642bbebccab80288c0a176ec531adf
-
SSDEEP
24576:syehs8BlmSYWfLQswZFsW4LVknPqE9kRCwzIZo8tvHEtk:beh7BlXDQ5FUswao8BEt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-