General
-
Target
871cba396875673097c170edb571a972
-
Size
586KB
-
Sample
210821-39p8v2jm5s
-
MD5
871cba396875673097c170edb571a972
-
SHA1
18e925fd8597c1deefd28832ad428744577e6eb0
-
SHA256
897676bf56a0dd969a5c9e566e05a0ca8c401d4d0c2002cbca223f249687f682
-
SHA512
39c249e77dc39e78adbf7b599df6cf81519438366cf13700f57500aeb71f663260cb10118630981a12da94bc6a54ca36b68873d2158d5a22d628607b2c445e63
Static task
static1
Behavioral task
behavioral1
Sample
871cba396875673097c170edb571a972.exe
Resource
win7v20210410
Malware Config
Extracted
redline
777
45.147.231.225:40668
Targets
-
-
Target
871cba396875673097c170edb571a972
-
Size
586KB
-
MD5
871cba396875673097c170edb571a972
-
SHA1
18e925fd8597c1deefd28832ad428744577e6eb0
-
SHA256
897676bf56a0dd969a5c9e566e05a0ca8c401d4d0c2002cbca223f249687f682
-
SHA512
39c249e77dc39e78adbf7b599df6cf81519438366cf13700f57500aeb71f663260cb10118630981a12da94bc6a54ca36b68873d2158d5a22d628607b2c445e63
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-