General
-
Target
e5be911860f3e6ccb9777f48b9613d919d4f6b2ab8c99e428067db05dac01cb9
-
Size
1.0MB
-
Sample
230421-qxnn7afg75
-
MD5
349194ac3465991819d7b37ba01bdb4d
-
SHA1
f5649c7a26b25cd0d6183a6206689407362c12ea
-
SHA256
e5be911860f3e6ccb9777f48b9613d919d4f6b2ab8c99e428067db05dac01cb9
-
SHA512
137b141247cb0988dfd42bcc825aedd2c1538431e99cf28253c5de2538adfb90a8fc41f7dc2716289fd47e8228c333dc58f9a9ae3e1ccefe5ea0dc2e150fb2b3
-
SSDEEP
24576:GyoM7IPacpbZcYRKgZyu5mkl8GMIS1tBGfNR7k9Q:V9CqY95jSpfY1RI9
Static task
static1
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
cheat
62.108.37.195:16060
Extracted
redline
special
176.123.9.142:14845
-
auth_value
bb28ee957fad348ef1dfce97134849bc
Targets
-
-
Target
e5be911860f3e6ccb9777f48b9613d919d4f6b2ab8c99e428067db05dac01cb9
-
Size
1.0MB
-
MD5
349194ac3465991819d7b37ba01bdb4d
-
SHA1
f5649c7a26b25cd0d6183a6206689407362c12ea
-
SHA256
e5be911860f3e6ccb9777f48b9613d919d4f6b2ab8c99e428067db05dac01cb9
-
SHA512
137b141247cb0988dfd42bcc825aedd2c1538431e99cf28253c5de2538adfb90a8fc41f7dc2716289fd47e8228c333dc58f9a9ae3e1ccefe5ea0dc2e150fb2b3
-
SSDEEP
24576:GyoM7IPacpbZcYRKgZyu5mkl8GMIS1tBGfNR7k9Q:V9CqY95jSpfY1RI9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-