General
-
Target
142aed306441e44abeaf6ed18f2709e38ac9272862de98ddbab999a573b5d7d3
-
Size
1023KB
-
Sample
230327-kkvzvaef2x
-
MD5
0732f867c6960e5683a3a2febc97d97d
-
SHA1
03dddbbaa708613cce045cd7dff827ac70e63d5c
-
SHA256
142aed306441e44abeaf6ed18f2709e38ac9272862de98ddbab999a573b5d7d3
-
SHA512
2398a771be84bc88604f50dbabf81f6d443424130234b39a6d972a4342e11e61f4df7651e012c450f8f0159022873cc83e60d90a3c2bf7b9a429bc15f9ac8dc4
-
SSDEEP
24576:hytEQJsm66Kx0JPndhRDlVmIbGMXn6/6y:U0m67g+ISMK/
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
reiv
193.233.20.33:4125
-
auth_value
5e0113277ad2cf97a9b7e175007f1c55
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
142aed306441e44abeaf6ed18f2709e38ac9272862de98ddbab999a573b5d7d3
-
Size
1023KB
-
MD5
0732f867c6960e5683a3a2febc97d97d
-
SHA1
03dddbbaa708613cce045cd7dff827ac70e63d5c
-
SHA256
142aed306441e44abeaf6ed18f2709e38ac9272862de98ddbab999a573b5d7d3
-
SHA512
2398a771be84bc88604f50dbabf81f6d443424130234b39a6d972a4342e11e61f4df7651e012c450f8f0159022873cc83e60d90a3c2bf7b9a429bc15f9ac8dc4
-
SSDEEP
24576:hytEQJsm66Kx0JPndhRDlVmIbGMXn6/6y:U0m67g+ISMK/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-