General
-
Target
Thu18f1102ca36b120b0.exe
-
Size
389KB
-
Sample
211104-zrmdlshfd2
-
MD5
b3297e6a01982c405b14ae61e4d08f50
-
SHA1
857e4bca996e204bfa0b3713cd4ada71096edf0c
-
SHA256
c37e330f97f7a2b2ec7c3ad76f1770dc75198b384dd6be64b6c5c8aa336c50da
-
SHA512
f614ba048d184bce6818e0d97fafbb40d82e279aeb2322b79005007229fd1cf115a510c5d88f48429354ba396738fe7e08f25715afbe897de7333c305c8fdd1a
Static task
static1
Behavioral task
behavioral1
Sample
Thu18f1102ca36b120b0.exe
Resource
win7-en-20211014
Malware Config
Extracted
redline
newjust
135.181.129.119:4805
Targets
-
-
Target
Thu18f1102ca36b120b0.exe
-
Size
389KB
-
MD5
b3297e6a01982c405b14ae61e4d08f50
-
SHA1
857e4bca996e204bfa0b3713cd4ada71096edf0c
-
SHA256
c37e330f97f7a2b2ec7c3ad76f1770dc75198b384dd6be64b6c5c8aa336c50da
-
SHA512
f614ba048d184bce6818e0d97fafbb40d82e279aeb2322b79005007229fd1cf115a510c5d88f48429354ba396738fe7e08f25715afbe897de7333c305c8fdd1a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-