General
-
Target
813231c2325b129c422bbe29d46aa07bd6a209712df8308b51abf64222e039b1
-
Size
1.2MB
-
Sample
230412-fvendsaa89
-
MD5
770ce4c39789c76b0b9d88dfbd48ccce
-
SHA1
1ecd87c57dce512677cb163e3ae386cf738a8040
-
SHA256
813231c2325b129c422bbe29d46aa07bd6a209712df8308b51abf64222e039b1
-
SHA512
81ccc7cc8444cb9dd58c82615e38b5db8662319304560c63e7e963f62efacbb740694e8e1efe0ec4a920b10c43f5bb2df05f943e4cbfb31e250edcfb6eae347e
-
SSDEEP
24576:1yAl7oU2WKzq+ZmQ5tuaZlIQ1K2UESDH4p4bS:Qa7oU2ZWmmWtLvI92Up4p
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
lore
185.161.248.90:4125
-
auth_value
523d51bd3c39801fa0405f4fb03df3c4
Extracted
amadey
3.70
80.66.79.86/joomla/index.php
Targets
-
-
Target
813231c2325b129c422bbe29d46aa07bd6a209712df8308b51abf64222e039b1
-
Size
1.2MB
-
MD5
770ce4c39789c76b0b9d88dfbd48ccce
-
SHA1
1ecd87c57dce512677cb163e3ae386cf738a8040
-
SHA256
813231c2325b129c422bbe29d46aa07bd6a209712df8308b51abf64222e039b1
-
SHA512
81ccc7cc8444cb9dd58c82615e38b5db8662319304560c63e7e963f62efacbb740694e8e1efe0ec4a920b10c43f5bb2df05f943e4cbfb31e250edcfb6eae347e
-
SSDEEP
24576:1yAl7oU2WKzq+ZmQ5tuaZlIQ1K2UESDH4p4bS:Qa7oU2ZWmmWtLvI92Up4p
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-