General
-
Target
52c1ff21710611a67be73b212613298ee374b6eb541f15ff8382a9e12147ffcd
-
Size
1.2MB
-
Sample
230504-cq9fesbe9x
-
MD5
3e446c42d4acb7d9931658d362fdc41e
-
SHA1
6b8c640faf9c2db8169504598baf64c4e12430e8
-
SHA256
52c1ff21710611a67be73b212613298ee374b6eb541f15ff8382a9e12147ffcd
-
SHA512
0968b26ccfa9954566a305b937abd1f70efe8392534d04ecc61a492bdd955cbb3dff23603e8cfcf44efcce94e5ef0afa087be73c73f5f352a0142abcd61e16cf
-
SSDEEP
24576:8yaHuKiT9fNcc5OQAabMm6UkKM1lF+4jMZoIftcZTbi4F1Fak6UPx:raHuKi515OAb6UlQX2ctm43wkz
Static task
static1
Malware Config
Extracted
redline
lakio
217.196.96.56:4138
-
auth_value
5a2372e90cce274157a245c74afe9d6e
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
52c1ff21710611a67be73b212613298ee374b6eb541f15ff8382a9e12147ffcd
-
Size
1.2MB
-
MD5
3e446c42d4acb7d9931658d362fdc41e
-
SHA1
6b8c640faf9c2db8169504598baf64c4e12430e8
-
SHA256
52c1ff21710611a67be73b212613298ee374b6eb541f15ff8382a9e12147ffcd
-
SHA512
0968b26ccfa9954566a305b937abd1f70efe8392534d04ecc61a492bdd955cbb3dff23603e8cfcf44efcce94e5ef0afa087be73c73f5f352a0142abcd61e16cf
-
SSDEEP
24576:8yaHuKiT9fNcc5OQAabMm6UkKM1lF+4jMZoIftcZTbi4F1Fak6UPx:raHuKi515OAb6UlQX2ctm43wkz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-