General
-
Target
f928e292ce7f292e7085024c89d3ea0afd6df8bdd79f62b900c5170da0e73851
-
Size
1.2MB
-
Sample
230502-jhrc7sbh7z
-
MD5
43db08e696387d3b676eb9f6e7b99e9e
-
SHA1
a974be70dbc6c7f6ffb868665a9e4f80f0c59d04
-
SHA256
f928e292ce7f292e7085024c89d3ea0afd6df8bdd79f62b900c5170da0e73851
-
SHA512
30932fd9c8157920184ab55a0315fdbe0eface1f1bf318bf962bab5dfddb8f69e7e3e7a30c0e80d28f5b0a73d64b88b948309ac0669e16a72bb5a81193003a8f
-
SSDEEP
24576:hyKUbHZli21E3CNBt1ZD/B8s5a7G6vXXtSuhgDPSOe3JbEsdwR9pE+DN:UKUbHBG381ZD/B8b71vX9Vd5bdiRPr
Static task
static1
Malware Config
Extracted
redline
luser
185.161.248.73:4164
-
auth_value
cf14a84de9a3b6b7b8981202f3b616fb
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
f928e292ce7f292e7085024c89d3ea0afd6df8bdd79f62b900c5170da0e73851
-
Size
1.2MB
-
MD5
43db08e696387d3b676eb9f6e7b99e9e
-
SHA1
a974be70dbc6c7f6ffb868665a9e4f80f0c59d04
-
SHA256
f928e292ce7f292e7085024c89d3ea0afd6df8bdd79f62b900c5170da0e73851
-
SHA512
30932fd9c8157920184ab55a0315fdbe0eface1f1bf318bf962bab5dfddb8f69e7e3e7a30c0e80d28f5b0a73d64b88b948309ac0669e16a72bb5a81193003a8f
-
SSDEEP
24576:hyKUbHZli21E3CNBt1ZD/B8s5a7G6vXXtSuhgDPSOe3JbEsdwR9pE+DN:UKUbHBG381ZD/B8b71vX9Vd5bdiRPr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-