General
-
Target
81be5f49654d06fea4f9c8f58b6fafd57d00a6f070e7bd1fef08c97a948fc079
-
Size
1.2MB
-
Sample
230502-f5w1eshg32
-
MD5
20743b3ee6b34711fc4b4cf35787b928
-
SHA1
a8796d9a619469ea5be47b50efb547a2f8b933bb
-
SHA256
81be5f49654d06fea4f9c8f58b6fafd57d00a6f070e7bd1fef08c97a948fc079
-
SHA512
4c6e0b11722d036d2a630c115e8ef4258db6cfc17527046ed1bcb23ea68608e9986778db635c1e41ada7775a8933d5e6ab23dbb90801b0946488ef51f6aefbba
-
SSDEEP
24576:SyXKk7lf5PSjekgT5WXLLxoQO8X+BRb1Hq+c3xPlsod3zgZf7KvB:5ak7lJodhHy0+chPr1qKv
Static task
static1
Malware Config
Extracted
redline
luser
185.161.248.73:4164
-
auth_value
cf14a84de9a3b6b7b8981202f3b616fb
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
81be5f49654d06fea4f9c8f58b6fafd57d00a6f070e7bd1fef08c97a948fc079
-
Size
1.2MB
-
MD5
20743b3ee6b34711fc4b4cf35787b928
-
SHA1
a8796d9a619469ea5be47b50efb547a2f8b933bb
-
SHA256
81be5f49654d06fea4f9c8f58b6fafd57d00a6f070e7bd1fef08c97a948fc079
-
SHA512
4c6e0b11722d036d2a630c115e8ef4258db6cfc17527046ed1bcb23ea68608e9986778db635c1e41ada7775a8933d5e6ab23dbb90801b0946488ef51f6aefbba
-
SSDEEP
24576:SyXKk7lf5PSjekgT5WXLLxoQO8X+BRb1Hq+c3xPlsod3zgZf7KvB:5ak7lJodhHy0+chPr1qKv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-