General
-
Target
d50ad57c02e8ad324f5be3139aeb1b8f703ad39c20ae70793c455136c56f0be5
-
Size
1021KB
-
Sample
230327-sg43caea34
-
MD5
c87859ca4de2a2d82c178ecf136b6a41
-
SHA1
fb5fd6b87fdd2e19917e3364a77becb98fd20ad4
-
SHA256
d50ad57c02e8ad324f5be3139aeb1b8f703ad39c20ae70793c455136c56f0be5
-
SHA512
4e68af676a9848d7a5ddd71c7769847cdcfc9010963057beab4501cef9fd7cce6fca94dea8ac6e482a59fe6424378a949c09799d48e104f35a0324ab34376bbb
-
SSDEEP
24576:mywE5FOrOkJTNmFkEVE6FNspAYQw4Qbj4tB9/xg:1tTOrxEFVpNY3+1
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
gong
193.233.20.33:4125
-
auth_value
16950897b83de3bba9e4de36f06a8c05
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
d50ad57c02e8ad324f5be3139aeb1b8f703ad39c20ae70793c455136c56f0be5
-
Size
1021KB
-
MD5
c87859ca4de2a2d82c178ecf136b6a41
-
SHA1
fb5fd6b87fdd2e19917e3364a77becb98fd20ad4
-
SHA256
d50ad57c02e8ad324f5be3139aeb1b8f703ad39c20ae70793c455136c56f0be5
-
SHA512
4e68af676a9848d7a5ddd71c7769847cdcfc9010963057beab4501cef9fd7cce6fca94dea8ac6e482a59fe6424378a949c09799d48e104f35a0324ab34376bbb
-
SSDEEP
24576:mywE5FOrOkJTNmFkEVE6FNspAYQw4Qbj4tB9/xg:1tTOrxEFVpNY3+1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-