General
-
Target
b8e59aa67e273e5d70ae78248187e78da20a5e8cf2da55a21187d951a4d0769e
-
Size
975KB
-
Sample
230403-zym9gsah9v
-
MD5
5a4e2693e028efbd6d740b4869246fc6
-
SHA1
628282a3c9f5fdfaefe300d67212511f01f3646b
-
SHA256
b8e59aa67e273e5d70ae78248187e78da20a5e8cf2da55a21187d951a4d0769e
-
SHA512
68d191ee094a5f9d77237554d98d43f1e57f149a9472e58d6b66529999a8ba1493eb344b79fd83de81ad586ce9f137704b2d103291839b96aa043a08f1ac8acc
-
SSDEEP
24576:3ynHXSQ0YOYWIp0jV9+7DC5gMFaDmc4Ke2X/x:CnHXB0cpE9+fC6xicD
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
link
176.113.115.145:4125
-
auth_value
77e4c7bc6fea5ae755b29e8aea8f7012
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Targets
-
-
Target
b8e59aa67e273e5d70ae78248187e78da20a5e8cf2da55a21187d951a4d0769e
-
Size
975KB
-
MD5
5a4e2693e028efbd6d740b4869246fc6
-
SHA1
628282a3c9f5fdfaefe300d67212511f01f3646b
-
SHA256
b8e59aa67e273e5d70ae78248187e78da20a5e8cf2da55a21187d951a4d0769e
-
SHA512
68d191ee094a5f9d77237554d98d43f1e57f149a9472e58d6b66529999a8ba1493eb344b79fd83de81ad586ce9f137704b2d103291839b96aa043a08f1ac8acc
-
SSDEEP
24576:3ynHXSQ0YOYWIp0jV9+7DC5gMFaDmc4Ke2X/x:CnHXB0cpE9+fC6xicD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-