General
-
Target
fe3dd63cf199172008baf3689f8eb16493ff3a4cc06d5ba15c1528880cde2de0
-
Size
423KB
-
Sample
211127-mc56ysaaep
-
MD5
9dec1d5cf15f804ccc0496f9b2ebec54
-
SHA1
32d4841a2dc1300a0a6708e63151929016583a1d
-
SHA256
fe3dd63cf199172008baf3689f8eb16493ff3a4cc06d5ba15c1528880cde2de0
-
SHA512
c6fe7973832e5d939f68b062090c5b39fbd3056e5ad0ba9819aa14d41bd9a68cd066122dcc14878ceb9179a9fb45499f633a0aaec20b23e07b5286447b9fa69a
Static task
static1
Malware Config
Extracted
redline
Updbdate
193.56.146.64:65441
Targets
-
-
Target
fe3dd63cf199172008baf3689f8eb16493ff3a4cc06d5ba15c1528880cde2de0
-
Size
423KB
-
MD5
9dec1d5cf15f804ccc0496f9b2ebec54
-
SHA1
32d4841a2dc1300a0a6708e63151929016583a1d
-
SHA256
fe3dd63cf199172008baf3689f8eb16493ff3a4cc06d5ba15c1528880cde2de0
-
SHA512
c6fe7973832e5d939f68b062090c5b39fbd3056e5ad0ba9819aa14d41bd9a68cd066122dcc14878ceb9179a9fb45499f633a0aaec20b23e07b5286447b9fa69a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-