General
-
Target
209eb2a1554380cbeb25e0dd817e1e5ce2cc84a51fb3310ab1c6450367ce78fe
-
Size
991KB
-
Sample
230401-v9sk5ach5w
-
MD5
ab55c23ff16e4a4a648803b825e25b45
-
SHA1
41feb95c3477b1543285f36708fead8c8dd8d9ec
-
SHA256
209eb2a1554380cbeb25e0dd817e1e5ce2cc84a51fb3310ab1c6450367ce78fe
-
SHA512
c907f3c817db53138551b6cb48442f3a50559db059b755b14f61e3981b0cc81a0849a94f22d24515c08cff1522649456c67f4859e073e98f490732b71914dbb6
-
SSDEEP
24576:TyO47qHlA4nqFUufikcZI/TpzM9qewBgo0YoHqnEsrdvP4izd2CW2eB:mbqFA4nqFU6cmLreDl8frdvQlh
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
link
176.113.115.145:4125
-
auth_value
77e4c7bc6fea5ae755b29e8aea8f7012
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
209eb2a1554380cbeb25e0dd817e1e5ce2cc84a51fb3310ab1c6450367ce78fe
-
Size
991KB
-
MD5
ab55c23ff16e4a4a648803b825e25b45
-
SHA1
41feb95c3477b1543285f36708fead8c8dd8d9ec
-
SHA256
209eb2a1554380cbeb25e0dd817e1e5ce2cc84a51fb3310ab1c6450367ce78fe
-
SHA512
c907f3c817db53138551b6cb48442f3a50559db059b755b14f61e3981b0cc81a0849a94f22d24515c08cff1522649456c67f4859e073e98f490732b71914dbb6
-
SSDEEP
24576:TyO47qHlA4nqFUufikcZI/TpzM9qewBgo0YoHqnEsrdvP4izd2CW2eB:mbqFA4nqFU6cmLreDl8frdvQlh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-