General
-
Target
73d7def516f13281fd06673ef3b5b87eb99ba4f708dbfa78a11bf0de94b23df1
-
Size
386KB
-
Sample
211022-vvcalacgfn
-
MD5
27988be4a41feb2b8b37dedb6949e9f4
-
SHA1
4bf776600242d676c07dab696999f13982f333ea
-
SHA256
73d7def516f13281fd06673ef3b5b87eb99ba4f708dbfa78a11bf0de94b23df1
-
SHA512
a4a0b3fb5730ffbf6de4a4261d06274b56fcc2c5d7c42c0731b43060a199ef166194648a52b34e4bf4cef7315c79f2a2ec1e7ae65c5d161766a5d3b6678df49a
Static task
static1
Malware Config
Extracted
redline
james222
135.181.129.119:4805
Targets
-
-
Target
73d7def516f13281fd06673ef3b5b87eb99ba4f708dbfa78a11bf0de94b23df1
-
Size
386KB
-
MD5
27988be4a41feb2b8b37dedb6949e9f4
-
SHA1
4bf776600242d676c07dab696999f13982f333ea
-
SHA256
73d7def516f13281fd06673ef3b5b87eb99ba4f708dbfa78a11bf0de94b23df1
-
SHA512
a4a0b3fb5730ffbf6de4a4261d06274b56fcc2c5d7c42c0731b43060a199ef166194648a52b34e4bf4cef7315c79f2a2ec1e7ae65c5d161766a5d3b6678df49a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-