General
-
Target
302089b6d915ee7a7b11ee870603c3f91e879fb9662469361f44c18ea7b521f5
-
Size
924KB
-
Sample
230503-b86xksdc73
-
MD5
4da8e4efc004ba2589e87626c23cbd11
-
SHA1
daa047c054a2a163b821b188b4c66226e080eddb
-
SHA256
302089b6d915ee7a7b11ee870603c3f91e879fb9662469361f44c18ea7b521f5
-
SHA512
64496e4186c174981c3fdf286d3d8b28d2518c66991e131ed5f921d35a6623e6dda3ed53e59e3461c77dbaafbc3aafb2abf456760e1871d13e9dd79ecb559445
-
SSDEEP
24576:TyJAPYJnhDVbsm3jcjQsIHq+6WV/pwUeKyc:mnJnhDVomzzqjWV/pway
Static task
static1
Behavioral task
behavioral1
Sample
302089b6d915ee7a7b11ee870603c3f91e879fb9662469361f44c18ea7b521f5.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
lupa
217.196.96.56:4138
-
auth_value
fcb02fce9bc10c56a9841d56974bd7b8
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
302089b6d915ee7a7b11ee870603c3f91e879fb9662469361f44c18ea7b521f5
-
Size
924KB
-
MD5
4da8e4efc004ba2589e87626c23cbd11
-
SHA1
daa047c054a2a163b821b188b4c66226e080eddb
-
SHA256
302089b6d915ee7a7b11ee870603c3f91e879fb9662469361f44c18ea7b521f5
-
SHA512
64496e4186c174981c3fdf286d3d8b28d2518c66991e131ed5f921d35a6623e6dda3ed53e59e3461c77dbaafbc3aafb2abf456760e1871d13e9dd79ecb559445
-
SSDEEP
24576:TyJAPYJnhDVbsm3jcjQsIHq+6WV/pwUeKyc:mnJnhDVomzzqjWV/pway
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-