General
-
Target
3552ac747719cfad23d350d1bbba0f20.exe
-
Size
364KB
-
Sample
210721-jardf2wttn
-
MD5
3552ac747719cfad23d350d1bbba0f20
-
SHA1
3f0bec0d436fa366c83f4e43e09a4f3bf6c9badc
-
SHA256
51dd1bfd096aa2df54b2c2f0ead05ca6eae63dfb50c93788163b4a5707fbe0da
-
SHA512
bbf0a28e172f56781eca2ae8267aed25ed4e3990c3759daec4f166fc72536b002e8462aa01a8f877507c92f672b219dccf954bbb7633160b230249dcecf09c58
Static task
static1
Behavioral task
behavioral1
Sample
3552ac747719cfad23d350d1bbba0f20.exe
Resource
win7v20210410
Malware Config
Extracted
redline
sel18
dwarimlari.xyz:80
Targets
-
-
Target
3552ac747719cfad23d350d1bbba0f20.exe
-
Size
364KB
-
MD5
3552ac747719cfad23d350d1bbba0f20
-
SHA1
3f0bec0d436fa366c83f4e43e09a4f3bf6c9badc
-
SHA256
51dd1bfd096aa2df54b2c2f0ead05ca6eae63dfb50c93788163b4a5707fbe0da
-
SHA512
bbf0a28e172f56781eca2ae8267aed25ed4e3990c3759daec4f166fc72536b002e8462aa01a8f877507c92f672b219dccf954bbb7633160b230249dcecf09c58
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-