General
-
Target
7d47db7a36854dc4b19d699681d331ffec9967065b4c417f27182d1521286cca
-
Size
1020KB
-
Sample
230327-stchvsgb3y
-
MD5
ec9b7b8c76c141a26a41baf4a80602da
-
SHA1
eaed75b2259078d2ce9bf375b6ea8551ad508721
-
SHA256
7d47db7a36854dc4b19d699681d331ffec9967065b4c417f27182d1521286cca
-
SHA512
486d8470332e3820a6e599ed07a0a3bf0a265f3caeee041a73b21312601bb742c3320153d81c7e886edb457dea0e308eb0d85185a5ab7dbfe2957f648a081233
-
SSDEEP
24576:tyaQDWO84jNRq0u1Y1kErP0SlgRYRxf6CDr3DQiOQb1UQQD:IaBObhRC1UPrMIT76CDTDl
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
gong
193.233.20.33:4125
-
auth_value
16950897b83de3bba9e4de36f06a8c05
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
7d47db7a36854dc4b19d699681d331ffec9967065b4c417f27182d1521286cca
-
Size
1020KB
-
MD5
ec9b7b8c76c141a26a41baf4a80602da
-
SHA1
eaed75b2259078d2ce9bf375b6ea8551ad508721
-
SHA256
7d47db7a36854dc4b19d699681d331ffec9967065b4c417f27182d1521286cca
-
SHA512
486d8470332e3820a6e599ed07a0a3bf0a265f3caeee041a73b21312601bb742c3320153d81c7e886edb457dea0e308eb0d85185a5ab7dbfe2957f648a081233
-
SSDEEP
24576:tyaQDWO84jNRq0u1Y1kErP0SlgRYRxf6CDr3DQiOQb1UQQD:IaBObhRC1UPrMIT76CDTDl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-