General
-
Target
0904daa045becaae1adb4d4106132fb7382e5917b03478bed77b90081f4d97ab
-
Size
1.2MB
-
Sample
230415-n86b9sfe7y
-
MD5
c5ff1525d6d5bf725fdeddcf716d2bb8
-
SHA1
ca914ffd8768cdd7d35fb90a18b7f2d1898e6a44
-
SHA256
0904daa045becaae1adb4d4106132fb7382e5917b03478bed77b90081f4d97ab
-
SHA512
0b2e0c2a0ac0e2924dd59e6ae9143adc8fba10b6202006fae11456fd08b09b99a015c8a05b17f323dd5c702afebc59290137d4be30afd282e12d6ba86935a08a
-
SSDEEP
24576:iyny/cWgTR0kjDScAHMzp+tigKoj5vqR2rU25Sikxf8y:JngaTpDmu+rKUV2V7
Static task
static1
Malware Config
Extracted
redline
losk
185.161.248.150:4128
-
auth_value
c0a6c391e53d2d9cd27bb17d1d38ada3
Extracted
redline
link
185.161.248.150:4128
-
auth_value
77e4c7bc6fea5ae755b29e8aea8f7012
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
0904daa045becaae1adb4d4106132fb7382e5917b03478bed77b90081f4d97ab
-
Size
1.2MB
-
MD5
c5ff1525d6d5bf725fdeddcf716d2bb8
-
SHA1
ca914ffd8768cdd7d35fb90a18b7f2d1898e6a44
-
SHA256
0904daa045becaae1adb4d4106132fb7382e5917b03478bed77b90081f4d97ab
-
SHA512
0b2e0c2a0ac0e2924dd59e6ae9143adc8fba10b6202006fae11456fd08b09b99a015c8a05b17f323dd5c702afebc59290137d4be30afd282e12d6ba86935a08a
-
SSDEEP
24576:iyny/cWgTR0kjDScAHMzp+tigKoj5vqR2rU25Sikxf8y:JngaTpDmu+rKUV2V7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-