General
-
Target
b27a5ca0a0933895ea686376353fbe6981b8b1af825e3b887f4ca4544d6d6c91
-
Size
346KB
-
Sample
220127-k41dnsaef3
-
MD5
f81083e9f58ce4916e696520ea4f6254
-
SHA1
a1d687bb752af5421309e86d56983a237b0768a5
-
SHA256
b27a5ca0a0933895ea686376353fbe6981b8b1af825e3b887f4ca4544d6d6c91
-
SHA512
2824c759ec73d4f49a579014ecd1fac14957a1806c54118045f4fcd81757ff10fa1fd02068313ec1c657c091a45800faecf6b8738e76ca46bd63b6a26feb5cc7
Static task
static1
Malware Config
Extracted
redline
212.192.246.94:58230
Targets
-
-
Target
b27a5ca0a0933895ea686376353fbe6981b8b1af825e3b887f4ca4544d6d6c91
-
Size
346KB
-
MD5
f81083e9f58ce4916e696520ea4f6254
-
SHA1
a1d687bb752af5421309e86d56983a237b0768a5
-
SHA256
b27a5ca0a0933895ea686376353fbe6981b8b1af825e3b887f4ca4544d6d6c91
-
SHA512
2824c759ec73d4f49a579014ecd1fac14957a1806c54118045f4fcd81757ff10fa1fd02068313ec1c657c091a45800faecf6b8738e76ca46bd63b6a26feb5cc7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-