General
-
Target
82a52a720fa4e2915b7e1ba24ede2cc9f440ec0472c4c29ed89f1c8c1b1373d6
-
Size
992KB
-
Sample
230402-clwzjaeb34
-
MD5
1aa85db1ea930baa295fbbb1c9aab3bc
-
SHA1
78ba60221fe9ca416f92386d5a6d08a19a0d18ad
-
SHA256
82a52a720fa4e2915b7e1ba24ede2cc9f440ec0472c4c29ed89f1c8c1b1373d6
-
SHA512
28de2748831900cd85f357c0b3ad84854416d4d57e3ee69492d8bd1c9ca9d6e027cde08ee3f4f8c8011a46acbaa8c5231b7a8339fb05a52e2cfa1aa045d67820
-
SSDEEP
24576:1yv4uRJIeieMhfWv/aSgrj2vfQlN5LUAx2kPBcxzHJEo:Qv1vieMpwySgaeNCAxBPCxN
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
link
176.113.115.145:4125
-
auth_value
77e4c7bc6fea5ae755b29e8aea8f7012
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
82a52a720fa4e2915b7e1ba24ede2cc9f440ec0472c4c29ed89f1c8c1b1373d6
-
Size
992KB
-
MD5
1aa85db1ea930baa295fbbb1c9aab3bc
-
SHA1
78ba60221fe9ca416f92386d5a6d08a19a0d18ad
-
SHA256
82a52a720fa4e2915b7e1ba24ede2cc9f440ec0472c4c29ed89f1c8c1b1373d6
-
SHA512
28de2748831900cd85f357c0b3ad84854416d4d57e3ee69492d8bd1c9ca9d6e027cde08ee3f4f8c8011a46acbaa8c5231b7a8339fb05a52e2cfa1aa045d67820
-
SSDEEP
24576:1yv4uRJIeieMhfWv/aSgrj2vfQlN5LUAx2kPBcxzHJEo:Qv1vieMpwySgaeNCAxBPCxN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-