General
-
Target
add6b6cafd0b139564439f6426604e3c2a26eac08165a9cfa7d90bdff98b0b21
-
Size
925KB
-
Sample
230503-e2nn7sdf52
-
MD5
ce70212e5ef156bf8788a24fcc89fba6
-
SHA1
6fce0374d2dc3c64a65aa61bf36b9df1cf52bfd7
-
SHA256
add6b6cafd0b139564439f6426604e3c2a26eac08165a9cfa7d90bdff98b0b21
-
SHA512
bbc843acd521becd3502b816c2bd408474ae31d735e2b59efb132b8e7ac83fa00019b8ac583cc62a45b306550da8a6d0871d1205736d8ddb97c3c43ed3defbdd
-
SSDEEP
24576:Ky+XvY7Xj8r4abKXYCyjZ3/gn5Be8PM8:R+XYzw4aPxxI5B3
Static task
static1
Behavioral task
behavioral1
Sample
add6b6cafd0b139564439f6426604e3c2a26eac08165a9cfa7d90bdff98b0b21.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lupa
217.196.96.56:4138
-
auth_value
fcb02fce9bc10c56a9841d56974bd7b8
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
add6b6cafd0b139564439f6426604e3c2a26eac08165a9cfa7d90bdff98b0b21
-
Size
925KB
-
MD5
ce70212e5ef156bf8788a24fcc89fba6
-
SHA1
6fce0374d2dc3c64a65aa61bf36b9df1cf52bfd7
-
SHA256
add6b6cafd0b139564439f6426604e3c2a26eac08165a9cfa7d90bdff98b0b21
-
SHA512
bbc843acd521becd3502b816c2bd408474ae31d735e2b59efb132b8e7ac83fa00019b8ac583cc62a45b306550da8a6d0871d1205736d8ddb97c3c43ed3defbdd
-
SSDEEP
24576:Ky+XvY7Xj8r4abKXYCyjZ3/gn5Be8PM8:R+XYzw4aPxxI5B3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-