General
-
Target
605377416e65149f47e4ec3f0d83ca4866db58b60d7dc0e21c70dc6d7b6c98dd
-
Size
533KB
-
Sample
210927-akkh1afdbn
-
MD5
47bb7b4a112985de1ade3dbf255cb7f1
-
SHA1
78bc4c1e0caf6dc755addd55534bce018268215c
-
SHA256
605377416e65149f47e4ec3f0d83ca4866db58b60d7dc0e21c70dc6d7b6c98dd
-
SHA512
1174353e6dd1b49345e6169ed0caf359918c650f17f43f9e055a843c4525479d00ef8c69327a20b179e60844f57d65ad33df8a8cf2675b9877888ac2446ab090
Static task
static1
Malware Config
Extracted
redline
27.09
185.215.113.17:48236
Targets
-
-
Target
605377416e65149f47e4ec3f0d83ca4866db58b60d7dc0e21c70dc6d7b6c98dd
-
Size
533KB
-
MD5
47bb7b4a112985de1ade3dbf255cb7f1
-
SHA1
78bc4c1e0caf6dc755addd55534bce018268215c
-
SHA256
605377416e65149f47e4ec3f0d83ca4866db58b60d7dc0e21c70dc6d7b6c98dd
-
SHA512
1174353e6dd1b49345e6169ed0caf359918c650f17f43f9e055a843c4525479d00ef8c69327a20b179e60844f57d65ad33df8a8cf2675b9877888ac2446ab090
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger
suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-