General
-
Target
57fdabadd8cad04b1a01bed6ab6d31b57169530cf6a4832732394a04e003c449
-
Size
550KB
-
Sample
210915-w6gvwseben
-
MD5
82a605547bd9885e5520ed2f8a9bc740
-
SHA1
2c486b2f9684144b5b41c905aaff4222f888b290
-
SHA256
57fdabadd8cad04b1a01bed6ab6d31b57169530cf6a4832732394a04e003c449
-
SHA512
7cfc034784e159dd605bd1560f9c21a9ff2d8e3b33733386a8cfca58a0221f3e2fe0112d37da03da782bbe9971c1ea96697aaa8775cbc525cefbdd69be3adaa1
Static task
static1
Malware Config
Extracted
redline
mix15.09
185.215.113.15:6043
Targets
-
-
Target
57fdabadd8cad04b1a01bed6ab6d31b57169530cf6a4832732394a04e003c449
-
Size
550KB
-
MD5
82a605547bd9885e5520ed2f8a9bc740
-
SHA1
2c486b2f9684144b5b41c905aaff4222f888b290
-
SHA256
57fdabadd8cad04b1a01bed6ab6d31b57169530cf6a4832732394a04e003c449
-
SHA512
7cfc034784e159dd605bd1560f9c21a9ff2d8e3b33733386a8cfca58a0221f3e2fe0112d37da03da782bbe9971c1ea96697aaa8775cbc525cefbdd69be3adaa1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger
suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-