General
-
Target
4902d6ab6b50397f94adabc09ad7117449cbef260583cfae1accfcb48ec62e98
-
Size
285KB
-
Sample
220803-t6jy5secck
-
MD5
d5ce66cff745e42bd0ee76c24ea2f0ec
-
SHA1
b0f858aecc8a0ec781ecc7565cd03018ee280554
-
SHA256
4902d6ab6b50397f94adabc09ad7117449cbef260583cfae1accfcb48ec62e98
-
SHA512
893618498b2857a4ca3fa4a817d41e2fee260174ade4a6551c15f4c1aa7638f4338882778ab0a0f5a2334e61321f97ae9d67200ed424e223969d3ca375fe8088
Static task
static1
Malware Config
Extracted
redline
AF2
stcontact.top:80
-
auth_value
4d729a2faecb406a0eb1d6fcf30432fa
Targets
-
-
Target
4902d6ab6b50397f94adabc09ad7117449cbef260583cfae1accfcb48ec62e98
-
Size
285KB
-
MD5
d5ce66cff745e42bd0ee76c24ea2f0ec
-
SHA1
b0f858aecc8a0ec781ecc7565cd03018ee280554
-
SHA256
4902d6ab6b50397f94adabc09ad7117449cbef260583cfae1accfcb48ec62e98
-
SHA512
893618498b2857a4ca3fa4a817d41e2fee260174ade4a6551c15f4c1aa7638f4338882778ab0a0f5a2334e61321f97ae9d67200ed424e223969d3ca375fe8088
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-