General
-
Target
28d6c89070c6f757ef281b321d53f1b84d138200b1103de897d10c671039b705
-
Size
1.1MB
-
Sample
230412-aq4ttshh91
-
MD5
4367cc76a5ec705f3b152e7f32d41341
-
SHA1
369541f415d4746c8f41426e0b1dcc8701a315bc
-
SHA256
28d6c89070c6f757ef281b321d53f1b84d138200b1103de897d10c671039b705
-
SHA512
efdb29d8f65708eff10e9cb703a2a9c14558a0249f7393f37a145f2d3870507029787268e51c5e521379563b11ef3aa97294479a2db83840d0ed62e484947a0e
-
SSDEEP
24576:MyBXkTwuwRjiDgYkv5Lk2MzOKHrM5aa5/26Ie9K:79kTwlRjma5LhOM51/rIe9
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
lore
185.161.248.90:4125
-
auth_value
523d51bd3c39801fa0405f4fb03df3c4
Extracted
amadey
3.70
80.66.79.86/joomla/index.php
Targets
-
-
Target
28d6c89070c6f757ef281b321d53f1b84d138200b1103de897d10c671039b705
-
Size
1.1MB
-
MD5
4367cc76a5ec705f3b152e7f32d41341
-
SHA1
369541f415d4746c8f41426e0b1dcc8701a315bc
-
SHA256
28d6c89070c6f757ef281b321d53f1b84d138200b1103de897d10c671039b705
-
SHA512
efdb29d8f65708eff10e9cb703a2a9c14558a0249f7393f37a145f2d3870507029787268e51c5e521379563b11ef3aa97294479a2db83840d0ed62e484947a0e
-
SSDEEP
24576:MyBXkTwuwRjiDgYkv5Lk2MzOKHrM5aa5/26Ie9K:79kTwlRjma5LhOM51/rIe9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-