General
-
Target
bcf607018ffb4b7943f68e63fbbb3e93
-
Size
1.5MB
-
Sample
210920-ltyb1agcaq
-
MD5
bcf607018ffb4b7943f68e63fbbb3e93
-
SHA1
3905de132a94ce399bdf81e290445aeed41a694a
-
SHA256
eab6488cbe3483381688092d905dcdafd89cf39ed1842a0db720e008d4828948
-
SHA512
5c91cccc90bef49e31470e16084ad496b6dc00f7d5725d8d644f1a36ab3479804b21b8c707ee6bfcd2419b7c794eed6a636f3e44c6900ab1514fed62428be457
Static task
static1
Behavioral task
behavioral1
Sample
bcf607018ffb4b7943f68e63fbbb3e93.exe
Resource
win7v20210408
Malware Config
Extracted
redline
REC
185.215.113.107:61144
Targets
-
-
Target
bcf607018ffb4b7943f68e63fbbb3e93
-
Size
1.5MB
-
MD5
bcf607018ffb4b7943f68e63fbbb3e93
-
SHA1
3905de132a94ce399bdf81e290445aeed41a694a
-
SHA256
eab6488cbe3483381688092d905dcdafd89cf39ed1842a0db720e008d4828948
-
SHA512
5c91cccc90bef49e31470e16084ad496b6dc00f7d5725d8d644f1a36ab3479804b21b8c707ee6bfcd2419b7c794eed6a636f3e44c6900ab1514fed62428be457
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-