General
-
Target
69dd97850f63fac1927313fb9983ab58
-
Size
1.1MB
-
Sample
210722-qp1lqt3lfn
-
MD5
69dd97850f63fac1927313fb9983ab58
-
SHA1
6b8bca9b8e5e8b32f198c37c08358533bb73a16e
-
SHA256
84904a91de28f8aff1863d9831dddea0110e94761287579926e843b1b4046608
-
SHA512
e59677426f60c3d7bcf36f5d12cda37e456ab79af45fe36506959f4da4215a36711b1399edc0dd8b9d65e6818c3abf2d8a111e9e90e6d2dab491e27a6554e526
Static task
static1
Behavioral task
behavioral1
Sample
69dd97850f63fac1927313fb9983ab58.exe
Resource
win7v20210410
Malware Config
Extracted
redline
33344
195.149.87.39:20170
Targets
-
-
Target
69dd97850f63fac1927313fb9983ab58
-
Size
1.1MB
-
MD5
69dd97850f63fac1927313fb9983ab58
-
SHA1
6b8bca9b8e5e8b32f198c37c08358533bb73a16e
-
SHA256
84904a91de28f8aff1863d9831dddea0110e94761287579926e843b1b4046608
-
SHA512
e59677426f60c3d7bcf36f5d12cda37e456ab79af45fe36506959f4da4215a36711b1399edc0dd8b9d65e6818c3abf2d8a111e9e90e6d2dab491e27a6554e526
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-