General
-
Target
ff328b453b385e6c759fbea7511e8e32.bin
-
Size
981KB
-
Sample
230329-ccswhsed25
-
MD5
ef315096ef21998d6b13a5e62ce877ea
-
SHA1
d8fa9dcf7803e053b9d88f6d88a1149b42e1bd73
-
SHA256
7003c36d32329f44e59d78da22c17bea9c9f6aa9869450cf3965dbf0d23aa4a5
-
SHA512
cb3109e7115ab5453ed5e23427b00b19dc5c35aa1070b42f7b77e1b1eff4d7be9eaf8356f0433574cf7e96a0722c3620c14177e6ad740cb4183eb5dc0194f4f6
-
SSDEEP
24576:/OFQgGdNpdqgbREjxUYhM257ASUevYnEpFVpGx9h5L0d:KQzz7rbRwUY6oQEXXkQ
Static task
static1
Behavioral task
behavioral1
Sample
1bca67c733cd0c9199a5c6957ae9f5a521453d3be3123312ca70fccfc59b0c7d.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
gong
193.233.20.33:4125
-
auth_value
16950897b83de3bba9e4de36f06a8c05
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
1bca67c733cd0c9199a5c6957ae9f5a521453d3be3123312ca70fccfc59b0c7d.exe
-
Size
1.0MB
-
MD5
ff328b453b385e6c759fbea7511e8e32
-
SHA1
111e1e0e2b86719eaaa4e548b5fbd56c8e752cb7
-
SHA256
1bca67c733cd0c9199a5c6957ae9f5a521453d3be3123312ca70fccfc59b0c7d
-
SHA512
4b99055135bdbb74850839cafd0a079bdb246ff46b19163d7877356cd7a3f1443eaddc85d6775e798858f54aba23266e72f36c24f53cb6d74ea2636828e8c5a7
-
SSDEEP
24576:yyS6Zut4eE09Ose8t685UuwNS/D4QHqU:Zlkt4r0+F8BD4k
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-