General
-
Target
9d7301c67f1622ae78ecb47d85bf5e693bc92f2a4c963068c03b6f7b24f33b96
-
Size
301KB
-
Sample
221227-1xk86sbg2s
-
MD5
2696436262a5e030ee3ea3957fed4c9a
-
SHA1
7dc56a360e948a0f9818abc5dbe1264e3595c054
-
SHA256
9d7301c67f1622ae78ecb47d85bf5e693bc92f2a4c963068c03b6f7b24f33b96
-
SHA512
180f8cdd55fd7454a40053f4e1ad962fb6b1374a24a10ccd00027cbd6e480259084131c11ca8d259ed3557ad9ecd9b09d1076ba437a1c685845e8b59d7735531
-
SSDEEP
6144:NTLZ0WbjOnFu5ROu41+xgp/9UZdLaYon5Jk4eROw:Jl0BuvOzUdin5JF
Static task
static1
Malware Config
Extracted
amadey
3.63
62.204.41.165/g8sjnd3xe/index.php
Extracted
gozi
Extracted
gozi
22500
confisg.edge.skype.com
http://
s28bxcw.xyz
config.edgse.skype.com
http://89.43.107.7
-
base_path
/recycle/
-
build
250249
-
exe_type
loader
-
extension
.alo
-
server_id
50
Extracted
redline
@2023@New
91.215.85.155:32796
-
auth_value
0be5b9b84cd5b707e91a48e341e3f7d7
Extracted
gozi
22500
confisg.edge.skype.com
http://s28bxcw.xyz
http://89.43.107.7
-
base_path
/recycle/
-
build
250249
-
exe_type
worker
-
extension
.alo
-
server_id
50
Targets
-
-
Target
9d7301c67f1622ae78ecb47d85bf5e693bc92f2a4c963068c03b6f7b24f33b96
-
Size
301KB
-
MD5
2696436262a5e030ee3ea3957fed4c9a
-
SHA1
7dc56a360e948a0f9818abc5dbe1264e3595c054
-
SHA256
9d7301c67f1622ae78ecb47d85bf5e693bc92f2a4c963068c03b6f7b24f33b96
-
SHA512
180f8cdd55fd7454a40053f4e1ad962fb6b1374a24a10ccd00027cbd6e480259084131c11ca8d259ed3557ad9ecd9b09d1076ba437a1c685845e8b59d7735531
-
SSDEEP
6144:NTLZ0WbjOnFu5ROu41+xgp/9UZdLaYon5Jk4eROw:Jl0BuvOzUdin5JF
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-