General
-
Target
677f31776366cf5ef7254f7c4a2a2c4e5cec1948300916bcc0457605f324cd2b
-
Size
1.2MB
-
Sample
230504-ecjzqabf8t
-
MD5
2d272c7204ccb37e6691304f35bdc194
-
SHA1
587e0e30161bb5de1430752b8ca7e568845cfb23
-
SHA256
677f31776366cf5ef7254f7c4a2a2c4e5cec1948300916bcc0457605f324cd2b
-
SHA512
f44003253c688488be186211c9cefe3adcbdc1a3e03848c70dee0a186bc9b269bcdd79c475851a752cda1d4bc71c6b7bb2aeeccbdadd40ebe323c2b433ab9319
-
SSDEEP
24576:My77MbXbl593XqIcnp0aDGXeWPG6DMXOAftcsTyoslyKna4:7XW7dwLGX3PGC/ecCDsly
Static task
static1
Malware Config
Extracted
redline
lakio
217.196.96.56:4138
-
auth_value
5a2372e90cce274157a245c74afe9d6e
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
677f31776366cf5ef7254f7c4a2a2c4e5cec1948300916bcc0457605f324cd2b
-
Size
1.2MB
-
MD5
2d272c7204ccb37e6691304f35bdc194
-
SHA1
587e0e30161bb5de1430752b8ca7e568845cfb23
-
SHA256
677f31776366cf5ef7254f7c4a2a2c4e5cec1948300916bcc0457605f324cd2b
-
SHA512
f44003253c688488be186211c9cefe3adcbdc1a3e03848c70dee0a186bc9b269bcdd79c475851a752cda1d4bc71c6b7bb2aeeccbdadd40ebe323c2b433ab9319
-
SSDEEP
24576:My77MbXbl593XqIcnp0aDGXeWPG6DMXOAftcsTyoslyKna4:7XW7dwLGX3PGC/ecCDsly
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-