General
-
Target
a5b95a64b5ea65e576a16906ddf88a1dd70a894fb07e7ad9dfd741e2e9041121
-
Size
490KB
-
Sample
230510-etkycagb5s
-
MD5
b0bb1891bb53d12750d6b88b6e981cb9
-
SHA1
927e9e3e98eed6af5b729158f48256753c8426b9
-
SHA256
a5b95a64b5ea65e576a16906ddf88a1dd70a894fb07e7ad9dfd741e2e9041121
-
SHA512
e7ec96e1778507284ba30a48f21afd73de8d6a2b1567140093fcdad9f7ba9d3a6a42942f535c44f8670d8c2e0eb6dea37cfb659db5a983eeee5b1af39f0015f9
-
SSDEEP
12288:4MrVy909If9AwdbFXPdec2QW8CWomjGIwYPCriR:tyKIVbdbFXPgcz9C6jGIHb
Static task
static1
Malware Config
Extracted
redline
lurfa
217.196.96.102:4132
-
auth_value
f6c26c2a5c6c25ae5b2e9abf31f6341d
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
cheat
194.87.151.202:9578
Targets
-
-
Target
a5b95a64b5ea65e576a16906ddf88a1dd70a894fb07e7ad9dfd741e2e9041121
-
Size
490KB
-
MD5
b0bb1891bb53d12750d6b88b6e981cb9
-
SHA1
927e9e3e98eed6af5b729158f48256753c8426b9
-
SHA256
a5b95a64b5ea65e576a16906ddf88a1dd70a894fb07e7ad9dfd741e2e9041121
-
SHA512
e7ec96e1778507284ba30a48f21afd73de8d6a2b1567140093fcdad9f7ba9d3a6a42942f535c44f8670d8c2e0eb6dea37cfb659db5a983eeee5b1af39f0015f9
-
SSDEEP
12288:4MrVy909If9AwdbFXPdec2QW8CWomjGIwYPCriR:tyKIVbdbFXPgcz9C6jGIHb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-