General
-
Target
03c9d092f03b568db03ae4d1f214724f2041b6281957c1404156f02a43c5ad23
-
Size
702KB
-
Sample
220126-vl25nagbc5
-
MD5
435757d3c3e80723c18c9053dbe3bb90
-
SHA1
8f38de1a3bf7a3937b712db14f11e8a6d1a3ec00
-
SHA256
03c9d092f03b568db03ae4d1f214724f2041b6281957c1404156f02a43c5ad23
-
SHA512
88387e0182d1969f2957e8814383624052d03460d7ef7770c4835504bdc9cb77992dd3c1e620cdb9a9f0e74abeba7e8e86ccb405757e6e6f279705b4be5fa99d
Static task
static1
Malware Config
Extracted
redline
mix26.01
185.215.113.70:21508
Targets
-
-
Target
03c9d092f03b568db03ae4d1f214724f2041b6281957c1404156f02a43c5ad23
-
Size
702KB
-
MD5
435757d3c3e80723c18c9053dbe3bb90
-
SHA1
8f38de1a3bf7a3937b712db14f11e8a6d1a3ec00
-
SHA256
03c9d092f03b568db03ae4d1f214724f2041b6281957c1404156f02a43c5ad23
-
SHA512
88387e0182d1969f2957e8814383624052d03460d7ef7770c4835504bdc9cb77992dd3c1e620cdb9a9f0e74abeba7e8e86ccb405757e6e6f279705b4be5fa99d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-