General
-
Target
a0bbcdf3b0bbd47c0286c87fba13f65def9bf95efc260c2f75b37a9c5e432725
-
Size
1020KB
-
Sample
230327-sjsr4aea43
-
MD5
04749277b9307fa9d56451fcc0946156
-
SHA1
678c915f9fcdf68d6a0acda14f9c1cc812b9d660
-
SHA256
a0bbcdf3b0bbd47c0286c87fba13f65def9bf95efc260c2f75b37a9c5e432725
-
SHA512
c58407a227fb837a6510c2d41dd8e77e7d0a273705713b17caaed9d79703f711bf035ec44ac1328494f6fe2ec507aea872beb2cd209a0b005d0ea7f93950d055
-
SSDEEP
12288:UMrNy90zrE+hvgK8H5JyTksrnrM0s+D3CtrEklsciTxkNqrykKjNEk7Bo5QbT85v:pyCrfwspDyt0y9EUK5Qbo2aigxzVF
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
gong
193.233.20.33:4125
-
auth_value
16950897b83de3bba9e4de36f06a8c05
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
a0bbcdf3b0bbd47c0286c87fba13f65def9bf95efc260c2f75b37a9c5e432725
-
Size
1020KB
-
MD5
04749277b9307fa9d56451fcc0946156
-
SHA1
678c915f9fcdf68d6a0acda14f9c1cc812b9d660
-
SHA256
a0bbcdf3b0bbd47c0286c87fba13f65def9bf95efc260c2f75b37a9c5e432725
-
SHA512
c58407a227fb837a6510c2d41dd8e77e7d0a273705713b17caaed9d79703f711bf035ec44ac1328494f6fe2ec507aea872beb2cd209a0b005d0ea7f93950d055
-
SSDEEP
12288:UMrNy90zrE+hvgK8H5JyTksrnrM0s+D3CtrEklsciTxkNqrykKjNEk7Bo5QbT85v:pyCrfwspDyt0y9EUK5Qbo2aigxzVF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-