General
-
Target
00a05dcb2cf578cf9af182dbcb4e089e7ca7923c01252a6ac8d1d393f67f344e
-
Size
1020KB
-
Sample
230327-q9stnsfg9s
-
MD5
ccb70871de4e385dfaf989565d587c0c
-
SHA1
deab2c71da0bbd58a115d05baa40ee28236f098d
-
SHA256
00a05dcb2cf578cf9af182dbcb4e089e7ca7923c01252a6ac8d1d393f67f344e
-
SHA512
0affa7c1b2a9f77b545aeabf78a3c064a697b9d2ba9c060c44b3066119d132fc7c009db15b38c54bf961fc7085fb85b65d65f3fe469d7ada3a3f2aa066240b2c
-
SSDEEP
24576:Ky6MPLUM6vSCpAvUIs4rRsT20RQ2Db88zrXcUaXQF:R68+SCavUIJwR5DbvYxQ
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
gong
193.233.20.33:4125
-
auth_value
16950897b83de3bba9e4de36f06a8c05
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
00a05dcb2cf578cf9af182dbcb4e089e7ca7923c01252a6ac8d1d393f67f344e
-
Size
1020KB
-
MD5
ccb70871de4e385dfaf989565d587c0c
-
SHA1
deab2c71da0bbd58a115d05baa40ee28236f098d
-
SHA256
00a05dcb2cf578cf9af182dbcb4e089e7ca7923c01252a6ac8d1d393f67f344e
-
SHA512
0affa7c1b2a9f77b545aeabf78a3c064a697b9d2ba9c060c44b3066119d132fc7c009db15b38c54bf961fc7085fb85b65d65f3fe469d7ada3a3f2aa066240b2c
-
SSDEEP
24576:Ky6MPLUM6vSCpAvUIs4rRsT20RQ2Db88zrXcUaXQF:R68+SCavUIJwR5DbvYxQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-