General
-
Target
d7dfc5a68f5ab9d7b2d52b773399ee45357ab352498f1c5080b4d643c878486a
-
Size
586KB
-
Sample
210821-hxlm9bc3p6
-
MD5
1cb884ef5dc76a942f06f07fe147b31d
-
SHA1
d23f3f659507d19d5d46fccd83562043f1ec6d89
-
SHA256
d7dfc5a68f5ab9d7b2d52b773399ee45357ab352498f1c5080b4d643c878486a
-
SHA512
60f7cbc84933ce0baf817d0acfb75a3558bb5c501ad22937938555559b36c16b40cd964d0336ade597b28c446b520cbc742169437c03d253cd30b7f346b79d36
Static task
static1
Malware Config
Extracted
redline
dibild
135.148.139.222:33569
Targets
-
-
Target
d7dfc5a68f5ab9d7b2d52b773399ee45357ab352498f1c5080b4d643c878486a
-
Size
586KB
-
MD5
1cb884ef5dc76a942f06f07fe147b31d
-
SHA1
d23f3f659507d19d5d46fccd83562043f1ec6d89
-
SHA256
d7dfc5a68f5ab9d7b2d52b773399ee45357ab352498f1c5080b4d643c878486a
-
SHA512
60f7cbc84933ce0baf817d0acfb75a3558bb5c501ad22937938555559b36c16b40cd964d0336ade597b28c446b520cbc742169437c03d253cd30b7f346b79d36
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-