General
-
Target
0999a14de0d9b3af9f17d01ba6400d7ad0b9247adc6e4a4a07589da0a921d980
-
Size
1.3MB
-
Sample
230502-fahjjshf65
-
MD5
5ab1477643e5e4aceb0f7fdae151df29
-
SHA1
6cffd2837dd6ce0884a59dfc7b11da0f650e4a11
-
SHA256
0999a14de0d9b3af9f17d01ba6400d7ad0b9247adc6e4a4a07589da0a921d980
-
SHA512
43b1112f17dc76e9a015e9703c5550e15c3f73dce7ac37c91940dcb028c460b9f0fd19c8ed19beaa642f1043d32404907220eb015513fab7c5a6ac1d60919188
-
SSDEEP
24576:ty/xwp+PpBxICeqJ1KdcL3/BvKrCbiohQydVr/bjVSnG9taQxCWU:I5g+PeCey1+COlEtaG
Static task
static1
Malware Config
Extracted
redline
luser
185.161.248.73:4164
-
auth_value
cf14a84de9a3b6b7b8981202f3b616fb
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
0999a14de0d9b3af9f17d01ba6400d7ad0b9247adc6e4a4a07589da0a921d980
-
Size
1.3MB
-
MD5
5ab1477643e5e4aceb0f7fdae151df29
-
SHA1
6cffd2837dd6ce0884a59dfc7b11da0f650e4a11
-
SHA256
0999a14de0d9b3af9f17d01ba6400d7ad0b9247adc6e4a4a07589da0a921d980
-
SHA512
43b1112f17dc76e9a015e9703c5550e15c3f73dce7ac37c91940dcb028c460b9f0fd19c8ed19beaa642f1043d32404907220eb015513fab7c5a6ac1d60919188
-
SSDEEP
24576:ty/xwp+PpBxICeqJ1KdcL3/BvKrCbiohQydVr/bjVSnG9taQxCWU:I5g+PeCey1+COlEtaG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-