General
-
Target
937c34001e5fdfb39656406c0875e18aeda4310b2a442738fc70a8fa3fb4e1ce
-
Size
1012KB
-
Sample
230327-p889lafe8z
-
MD5
0a7267e8de07c6c530a4b65e70b29a7e
-
SHA1
d4f00f60089d21f1d765ce3cf725e4deb6f5dd00
-
SHA256
937c34001e5fdfb39656406c0875e18aeda4310b2a442738fc70a8fa3fb4e1ce
-
SHA512
3c92e28b279246827bcae1cd126f8a574378ac317768a03442c591ff60760356de0dffafeb7321fbcafba320896b73b736a2371706e79cad0db4a0d5a4d00fe6
-
SSDEEP
24576:ayudJOYL1E8A5Ood2O7im8qBjP/9Ek81h9xbeBvSYp79:hSJOYL1SHIO7n19ktxKSYp
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
gong
193.233.20.33:4125
-
auth_value
16950897b83de3bba9e4de36f06a8c05
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
937c34001e5fdfb39656406c0875e18aeda4310b2a442738fc70a8fa3fb4e1ce
-
Size
1012KB
-
MD5
0a7267e8de07c6c530a4b65e70b29a7e
-
SHA1
d4f00f60089d21f1d765ce3cf725e4deb6f5dd00
-
SHA256
937c34001e5fdfb39656406c0875e18aeda4310b2a442738fc70a8fa3fb4e1ce
-
SHA512
3c92e28b279246827bcae1cd126f8a574378ac317768a03442c591ff60760356de0dffafeb7321fbcafba320896b73b736a2371706e79cad0db4a0d5a4d00fe6
-
SSDEEP
24576:ayudJOYL1E8A5Ood2O7im8qBjP/9Ek81h9xbeBvSYp79:hSJOYL1SHIO7n19ktxKSYp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-