General
-
Target
dfd0333bd7b527d6447417f2f5996015f539ddaa9d7237b558f67bf6139e14f5
-
Size
1.2MB
-
Sample
230504-aymkhsbc7z
-
MD5
611e8b35a373d74349f389fc12f30d3f
-
SHA1
89f2ef3aaeed9f2869c08b60a851dcffd3a1cae0
-
SHA256
dfd0333bd7b527d6447417f2f5996015f539ddaa9d7237b558f67bf6139e14f5
-
SHA512
d8cf3dc4bd7d4601ba53eb306b31ab0bc430e4c107d8dcf0f6c59b364715a0af430cca4e8e7637cdae289dd19e0884676e1543e2730c39b99fb0340b2b930209
-
SSDEEP
24576:uyCzj9HadcIWzvs02evhSdhmSx2+MTkdr83PsOCPaX/9p1jH1LGLm2fOEg:9CzjkdcIqvs0N5Sr1fdo30PmVLEm2
Static task
static1
Malware Config
Extracted
redline
lakio
217.196.96.56:4138
-
auth_value
5a2372e90cce274157a245c74afe9d6e
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
dfd0333bd7b527d6447417f2f5996015f539ddaa9d7237b558f67bf6139e14f5
-
Size
1.2MB
-
MD5
611e8b35a373d74349f389fc12f30d3f
-
SHA1
89f2ef3aaeed9f2869c08b60a851dcffd3a1cae0
-
SHA256
dfd0333bd7b527d6447417f2f5996015f539ddaa9d7237b558f67bf6139e14f5
-
SHA512
d8cf3dc4bd7d4601ba53eb306b31ab0bc430e4c107d8dcf0f6c59b364715a0af430cca4e8e7637cdae289dd19e0884676e1543e2730c39b99fb0340b2b930209
-
SSDEEP
24576:uyCzj9HadcIWzvs02evhSdhmSx2+MTkdr83PsOCPaX/9p1jH1LGLm2fOEg:9CzjkdcIqvs0N5Sr1fdo30PmVLEm2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-