General
-
Target
ce9fdd07d640c4f00d24c980a8d4b0fed1012a1b039becc6bee7253927c4ddc1
-
Size
1021KB
-
Sample
230327-rkhsvafh4w
-
MD5
71d71499f8d66f6382122d336114e38b
-
SHA1
0ca7fd299973ca12300489e88ff7651e9dba19b7
-
SHA256
ce9fdd07d640c4f00d24c980a8d4b0fed1012a1b039becc6bee7253927c4ddc1
-
SHA512
0af855b35fe3e7e570ad1d336b93c15237324eee38f7039c5f742ea5e1f823274cd9efa4d27458d427b5bf670c58e4782fb728419b12ef4f04de453913548875
-
SSDEEP
24576:kyyTTvXGYuLFrM9oW9T5doQAwIM57xQ61OWFsqA38O8n:zCPGYag7dosICxhVFsHMO8
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
gong
193.233.20.33:4125
-
auth_value
16950897b83de3bba9e4de36f06a8c05
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
ce9fdd07d640c4f00d24c980a8d4b0fed1012a1b039becc6bee7253927c4ddc1
-
Size
1021KB
-
MD5
71d71499f8d66f6382122d336114e38b
-
SHA1
0ca7fd299973ca12300489e88ff7651e9dba19b7
-
SHA256
ce9fdd07d640c4f00d24c980a8d4b0fed1012a1b039becc6bee7253927c4ddc1
-
SHA512
0af855b35fe3e7e570ad1d336b93c15237324eee38f7039c5f742ea5e1f823274cd9efa4d27458d427b5bf670c58e4782fb728419b12ef4f04de453913548875
-
SSDEEP
24576:kyyTTvXGYuLFrM9oW9T5doQAwIM57xQ61OWFsqA38O8n:zCPGYag7dosICxhVFsHMO8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-