General
-
Target
d8e73301974c709865069a6b6b0f11c8198de7a92cd6f4283c7cb7abbb9c1932
-
Size
1.2MB
-
Sample
230502-al6smahb66
-
MD5
dc416f54e79c49333dc2258e868e9395
-
SHA1
8c8372d7c079b437a02d74160e62207e2c4f0c81
-
SHA256
d8e73301974c709865069a6b6b0f11c8198de7a92cd6f4283c7cb7abbb9c1932
-
SHA512
6227b75d2ffdfcab56f6c136277e537091edc0374cc516a9017e5b0228a97bbbeb088d4511e064f0486b78e64e00d26aeef8f9ff24ca833dfb95ec525077c4bc
-
SSDEEP
24576:Ly7FWGaLuX2V1LG17m8IKFWbWNbsaeqY2WigFJ01ksca2PR1uJBozceTPnfW:+ZWGaLue8iaqaftWHa+R1uJBozZPf
Static task
static1
Malware Config
Extracted
redline
luser
185.161.248.73:4164
-
auth_value
cf14a84de9a3b6b7b8981202f3b616fb
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
d8e73301974c709865069a6b6b0f11c8198de7a92cd6f4283c7cb7abbb9c1932
-
Size
1.2MB
-
MD5
dc416f54e79c49333dc2258e868e9395
-
SHA1
8c8372d7c079b437a02d74160e62207e2c4f0c81
-
SHA256
d8e73301974c709865069a6b6b0f11c8198de7a92cd6f4283c7cb7abbb9c1932
-
SHA512
6227b75d2ffdfcab56f6c136277e537091edc0374cc516a9017e5b0228a97bbbeb088d4511e064f0486b78e64e00d26aeef8f9ff24ca833dfb95ec525077c4bc
-
SSDEEP
24576:Ly7FWGaLuX2V1LG17m8IKFWbWNbsaeqY2WigFJ01ksca2PR1uJBozceTPnfW:+ZWGaLue8iaqaftWHa+R1uJBozZPf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-