General
-
Target
bf662ca207feacc94aa2504e018f734244e8ee0d17322df89d042493948a6aaf
-
Size
1021KB
-
Sample
230327-sdyq6aea28
-
MD5
ef11c82ddb04dddf9a235e2be6325c6a
-
SHA1
dd21e1b21ba9a6945f1fc26338a4487d0b36f66e
-
SHA256
bf662ca207feacc94aa2504e018f734244e8ee0d17322df89d042493948a6aaf
-
SHA512
4f37b6c83ae0e75d2823f1435957d060d5534c59b3af22fe5184523d4832cd00fc1a99a0092e4fbd0314420d1a2e61b1ab7cdf43417d3c872e3f8e956f175c41
-
SSDEEP
24576:ZyS8ZbHYERB0SlOAICErEeajtwr61AKH68vZ4Q7hQbaQM4+73:MZHYEvITgeajtwqAqp4MIM
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
gong
193.233.20.33:4125
-
auth_value
16950897b83de3bba9e4de36f06a8c05
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
bf662ca207feacc94aa2504e018f734244e8ee0d17322df89d042493948a6aaf
-
Size
1021KB
-
MD5
ef11c82ddb04dddf9a235e2be6325c6a
-
SHA1
dd21e1b21ba9a6945f1fc26338a4487d0b36f66e
-
SHA256
bf662ca207feacc94aa2504e018f734244e8ee0d17322df89d042493948a6aaf
-
SHA512
4f37b6c83ae0e75d2823f1435957d060d5534c59b3af22fe5184523d4832cd00fc1a99a0092e4fbd0314420d1a2e61b1ab7cdf43417d3c872e3f8e956f175c41
-
SSDEEP
24576:ZyS8ZbHYERB0SlOAICErEeajtwr61AKH68vZ4Q7hQbaQM4+73:MZHYEvITgeajtwqAqp4MIM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-