General
-
Target
618969df2d98c660836fc0c94f95d93c8c561f19f106c56eca3f5aa9930cbba8.exe
-
Size
2.9MB
-
Sample
240107-w5ts3acfd3
-
MD5
478c7cd1d366a77444568d45f252abeb
-
SHA1
0e717c6fc62ece11a17919ce1f1cc5cdc1bc711e
-
SHA256
618969df2d98c660836fc0c94f95d93c8c561f19f106c56eca3f5aa9930cbba8
-
SHA512
541d2430bb2bedffd8d489bcbe77d2cdc2207b8faa88affb7312469e1fcf6de8d8b810b66906f61dd0b8ba95a04309184478bbb69cac6161e9b0b2625b2f45de
-
SSDEEP
49152:9gIxFNiOIkvx2ldpBGld+BvTljVvDq88tnuiRLAKDw8rE6xjHgCF8jv4IGKctXug:ycnIkElbBGld+fFqNcKRxlASSvLGKMXd
Static task
static1
Malware Config
Extracted
gcleaner
194.145.227.161
Extracted
redline
Lyla
95.181.172.207:56915
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
nullmixer
http://hsiens.xyz/
Extracted
gozi
Extracted
vidar
40.5
706
https://gheorghip.tumblr.com/
-
profile_id
706
Targets
-
-
Target
618969df2d98c660836fc0c94f95d93c8c561f19f106c56eca3f5aa9930cbba8.exe
-
Size
2.9MB
-
MD5
478c7cd1d366a77444568d45f252abeb
-
SHA1
0e717c6fc62ece11a17919ce1f1cc5cdc1bc711e
-
SHA256
618969df2d98c660836fc0c94f95d93c8c561f19f106c56eca3f5aa9930cbba8
-
SHA512
541d2430bb2bedffd8d489bcbe77d2cdc2207b8faa88affb7312469e1fcf6de8d8b810b66906f61dd0b8ba95a04309184478bbb69cac6161e9b0b2625b2f45de
-
SSDEEP
49152:9gIxFNiOIkvx2ldpBGld+BvTljVvDq88tnuiRLAKDw8rE6xjHgCF8jv4IGKctXug:ycnIkElbBGld+fFqNcKRxlASSvLGKMXd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
OnlyLogger payload
-
Vidar Stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-