General
-
Target
9d75ff57dc1cf2e24826c747d93dc0ce983f268a556a47f7e7cbb6f13021746f
-
Size
991KB
-
Sample
230401-ll7wgaae9s
-
MD5
867840a479a292aefdae8b8f10011a31
-
SHA1
5a8d1dc5c178d5f580000c1e3a5d18c8730b2e99
-
SHA256
9d75ff57dc1cf2e24826c747d93dc0ce983f268a556a47f7e7cbb6f13021746f
-
SHA512
e4b259bf71201c3272d7e20cc06caefd51ac14c48a2d3f0ba2156bc749a5de055d412a6233b01cfd6a52c4254e8e6691dcae1e0548c0574ed5397ce8bc3c857b
-
SSDEEP
24576:zy9OUFGiHTYutACP5o9J6QvFDDlkmD4LeTsR:G4UFp+Ci9J3vJpFDGeI
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
lift
176.113.115.145:4125
-
auth_value
94f33c242a83de9dcc729e29ec435dfb
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
9d75ff57dc1cf2e24826c747d93dc0ce983f268a556a47f7e7cbb6f13021746f
-
Size
991KB
-
MD5
867840a479a292aefdae8b8f10011a31
-
SHA1
5a8d1dc5c178d5f580000c1e3a5d18c8730b2e99
-
SHA256
9d75ff57dc1cf2e24826c747d93dc0ce983f268a556a47f7e7cbb6f13021746f
-
SHA512
e4b259bf71201c3272d7e20cc06caefd51ac14c48a2d3f0ba2156bc749a5de055d412a6233b01cfd6a52c4254e8e6691dcae1e0548c0574ed5397ce8bc3c857b
-
SSDEEP
24576:zy9OUFGiHTYutACP5o9J6QvFDDlkmD4LeTsR:G4UFp+Ci9J3vJpFDGeI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-