General
-
Target
40b7a22c8c24cabbd52d67523892bc6ce8c9b744d395baedc749a6551f0addf8
-
Size
1.1MB
-
Sample
230412-c2rpraha98
-
MD5
62d24ac117267eca54a18ac35ec15da7
-
SHA1
713bcd66cc490a18a536d667598a5d26b13b5c53
-
SHA256
40b7a22c8c24cabbd52d67523892bc6ce8c9b744d395baedc749a6551f0addf8
-
SHA512
008720bf97e79517612ca4123b6c9aba2017c783722eb4787adf3508143393dab11eb96873e7f599db6ea337152e09f0e401fbfd4aa6ee32fe6c21e772391f6b
-
SSDEEP
24576:2yWtfsokLNFXJTsYxBIf+XYLf5q1vGOSSbZoQ:Fss9DXJVkfl5q1vqS2
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
lore
185.161.248.90:4125
-
auth_value
523d51bd3c39801fa0405f4fb03df3c4
Extracted
amadey
3.70
80.66.79.86/joomla/index.php
Targets
-
-
Target
40b7a22c8c24cabbd52d67523892bc6ce8c9b744d395baedc749a6551f0addf8
-
Size
1.1MB
-
MD5
62d24ac117267eca54a18ac35ec15da7
-
SHA1
713bcd66cc490a18a536d667598a5d26b13b5c53
-
SHA256
40b7a22c8c24cabbd52d67523892bc6ce8c9b744d395baedc749a6551f0addf8
-
SHA512
008720bf97e79517612ca4123b6c9aba2017c783722eb4787adf3508143393dab11eb96873e7f599db6ea337152e09f0e401fbfd4aa6ee32fe6c21e772391f6b
-
SSDEEP
24576:2yWtfsokLNFXJTsYxBIf+XYLf5q1vGOSSbZoQ:Fss9DXJVkfl5q1vqS2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-