General
-
Target
02efe4b25922ca50e59720c7f725fddaaab0595b9b5b02ba8f3e205dfa4bb808
-
Size
239KB
-
Sample
210926-xw29hsfbgj
-
MD5
1f8eba8adcc6011192cc0eb1f59c3e36
-
SHA1
738d71b7dd93135fb4a128708ee2e6fd40ed3d4f
-
SHA256
02efe4b25922ca50e59720c7f725fddaaab0595b9b5b02ba8f3e205dfa4bb808
-
SHA512
387f6769e1cb1c239cfbfa9b811c8da107c402bdbb1bfc20a8ca4483fe6891e83d9c8ecc423b1b200de00dda784d8426ab7c750a4bd30440dd22db3955609cd4
Static task
static1
Malware Config
Extracted
redline
UDP
45.9.20.20:13441
Targets
-
-
Target
02efe4b25922ca50e59720c7f725fddaaab0595b9b5b02ba8f3e205dfa4bb808
-
Size
239KB
-
MD5
1f8eba8adcc6011192cc0eb1f59c3e36
-
SHA1
738d71b7dd93135fb4a128708ee2e6fd40ed3d4f
-
SHA256
02efe4b25922ca50e59720c7f725fddaaab0595b9b5b02ba8f3e205dfa4bb808
-
SHA512
387f6769e1cb1c239cfbfa9b811c8da107c402bdbb1bfc20a8ca4483fe6891e83d9c8ecc423b1b200de00dda784d8426ab7c750a4bd30440dd22db3955609cd4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-