General
-
Target
5ef1e8724c39c9fdb9617d01d4ec1e988dfde8afb27005faf2054d419f802b83
-
Size
587KB
-
Sample
210821-vjc1c3m3b2
-
MD5
c134fd59a0edd97d73547be4f54360de
-
SHA1
ffd58a98889183fbb17bdd141e18253c047fa39d
-
SHA256
5ef1e8724c39c9fdb9617d01d4ec1e988dfde8afb27005faf2054d419f802b83
-
SHA512
346d71199dd1c745c8419bb3f3002671a8ec073dfc08c36f418a1e6e857f5064eeb495e45d63ff41b2c5c2c9bb2844fa4fa36d6d9d07960c456138c69bb0cacb
Static task
static1
Malware Config
Extracted
redline
dibild
135.148.139.222:33569
Targets
-
-
Target
5ef1e8724c39c9fdb9617d01d4ec1e988dfde8afb27005faf2054d419f802b83
-
Size
587KB
-
MD5
c134fd59a0edd97d73547be4f54360de
-
SHA1
ffd58a98889183fbb17bdd141e18253c047fa39d
-
SHA256
5ef1e8724c39c9fdb9617d01d4ec1e988dfde8afb27005faf2054d419f802b83
-
SHA512
346d71199dd1c745c8419bb3f3002671a8ec073dfc08c36f418a1e6e857f5064eeb495e45d63ff41b2c5c2c9bb2844fa4fa36d6d9d07960c456138c69bb0cacb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-