General
-
Target
08116b2de8c5979d3b894c0df1b38363ef533c5016340f6667df3683e7a9f0e5
-
Size
415KB
-
Sample
211020-yzczgaheg6
-
MD5
e2141c60a72a6ad5525876264fc87ef3
-
SHA1
6cd2d5dec8f089a9c7ebf0fdb737bae854ce889c
-
SHA256
08116b2de8c5979d3b894c0df1b38363ef533c5016340f6667df3683e7a9f0e5
-
SHA512
6badb71923421994814e94375c61c9d02c195cbc0cfb7da3648209dc397baab1911faf4058faf61eb30e64aee4244c11fceaa4cb8e6d5bb5192dff2a2f01ed43
Static task
static1
Malware Config
Extracted
redline
UDP
45.9.20.182:52236
Targets
-
-
Target
08116b2de8c5979d3b894c0df1b38363ef533c5016340f6667df3683e7a9f0e5
-
Size
415KB
-
MD5
e2141c60a72a6ad5525876264fc87ef3
-
SHA1
6cd2d5dec8f089a9c7ebf0fdb737bae854ce889c
-
SHA256
08116b2de8c5979d3b894c0df1b38363ef533c5016340f6667df3683e7a9f0e5
-
SHA512
6badb71923421994814e94375c61c9d02c195cbc0cfb7da3648209dc397baab1911faf4058faf61eb30e64aee4244c11fceaa4cb8e6d5bb5192dff2a2f01ed43
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-