General
-
Target
1b32d35238db4828940653bd42fe8be041f03f070d8146f23a66fa082d22df4a
-
Size
702KB
-
Sample
220126-km6jcsbdb2
-
MD5
84b185fd9c5121df2686d9235d1b373e
-
SHA1
9a3dd8deeb5632db59aa099d3f2c983b13a1b0a4
-
SHA256
1b32d35238db4828940653bd42fe8be041f03f070d8146f23a66fa082d22df4a
-
SHA512
6cc024681d5cdedd479c2478e960b46ba62d7b70d2548edccffe15629c821f56192529f3c02fb78df93fc09b5cba08ab21922da34a5d8a26e51c45d1153df27a
Static task
static1
Malware Config
Extracted
redline
mix26.01
185.215.113.70:21508
Targets
-
-
Target
1b32d35238db4828940653bd42fe8be041f03f070d8146f23a66fa082d22df4a
-
Size
702KB
-
MD5
84b185fd9c5121df2686d9235d1b373e
-
SHA1
9a3dd8deeb5632db59aa099d3f2c983b13a1b0a4
-
SHA256
1b32d35238db4828940653bd42fe8be041f03f070d8146f23a66fa082d22df4a
-
SHA512
6cc024681d5cdedd479c2478e960b46ba62d7b70d2548edccffe15629c821f56192529f3c02fb78df93fc09b5cba08ab21922da34a5d8a26e51c45d1153df27a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-