General
-
Target
3242f74bc2e2936de899a749ecff59cf
-
Size
195KB
-
Sample
210724-69ra7d89n6
-
MD5
3242f74bc2e2936de899a749ecff59cf
-
SHA1
9176f251c6c4135190315ef9d4a2f25b7a801c56
-
SHA256
55aecb45a0e3844c0621c28907e857ec0ab23372e57bfa5dd614ea0b298b2c71
-
SHA512
fc7f74b3153a3c798a89fda1efe4809568cd35a7c00a3611275013c0a1ffbbead29e1e67e853875b56e73404c7dcc7c8f4e38296cc560e1086c91f4fcc989927
Static task
static1
Behavioral task
behavioral1
Sample
3242f74bc2e2936de899a749ecff59cf.exe
Resource
win7v20210408
Malware Config
Extracted
redline
723
qumaranero.xyz:80
Targets
-
-
Target
3242f74bc2e2936de899a749ecff59cf
-
Size
195KB
-
MD5
3242f74bc2e2936de899a749ecff59cf
-
SHA1
9176f251c6c4135190315ef9d4a2f25b7a801c56
-
SHA256
55aecb45a0e3844c0621c28907e857ec0ab23372e57bfa5dd614ea0b298b2c71
-
SHA512
fc7f74b3153a3c798a89fda1efe4809568cd35a7c00a3611275013c0a1ffbbead29e1e67e853875b56e73404c7dcc7c8f4e38296cc560e1086c91f4fcc989927
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-