General
-
Target
63251d54f9e11c673539780b285b4155f75c40771d3c120fe8bf9377ad1bfb6d
-
Size
1021KB
-
Sample
230327-sndhzaga9x
-
MD5
40108da7b919385d3fbefc9a59944b78
-
SHA1
b4c7e2c38a2e682dde4c9bcb83baa5bea1974191
-
SHA256
63251d54f9e11c673539780b285b4155f75c40771d3c120fe8bf9377ad1bfb6d
-
SHA512
1295215c1e8b71c80f423371fd8532e906f648fcf54c2132143d2c92ddf758d8786c7996a78a415e280c598943306be9ed132e9eadd16dd685e1fe66ff69f1e5
-
SSDEEP
24576:Myed4qZWPU7GLTO89m91eK3kMPQgSkhynmF1nQERyfOY5:7ed4qZSm8LFKzPrSznmFrAO
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
gong
193.233.20.33:4125
-
auth_value
16950897b83de3bba9e4de36f06a8c05
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
63251d54f9e11c673539780b285b4155f75c40771d3c120fe8bf9377ad1bfb6d
-
Size
1021KB
-
MD5
40108da7b919385d3fbefc9a59944b78
-
SHA1
b4c7e2c38a2e682dde4c9bcb83baa5bea1974191
-
SHA256
63251d54f9e11c673539780b285b4155f75c40771d3c120fe8bf9377ad1bfb6d
-
SHA512
1295215c1e8b71c80f423371fd8532e906f648fcf54c2132143d2c92ddf758d8786c7996a78a415e280c598943306be9ed132e9eadd16dd685e1fe66ff69f1e5
-
SSDEEP
24576:Myed4qZWPU7GLTO89m91eK3kMPQgSkhynmF1nQERyfOY5:7ed4qZSm8LFKzPrSznmFrAO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-