General
-
Target
b563494079d8f625dfd89eafb39c200ae4792e9beec553294fb6014bd61220c8
-
Size
417KB
-
Sample
220806-bp7prshabk
-
MD5
c9b5ecbffa258e754c83284f1ec2d375
-
SHA1
82c4553df3ba1d25bb8f31d679133ccea881b962
-
SHA256
b563494079d8f625dfd89eafb39c200ae4792e9beec553294fb6014bd61220c8
-
SHA512
5160e424a6cde590e11803780f8ef494662047077f6a69a9097e5ad84c126b896373cae7322857a4da655bb5426434cdbf194724ac0ee48f441ac6a04df18205
Static task
static1
Malware Config
Extracted
redline
AF2
stcontact.top:80
-
auth_value
4d729a2faecb406a0eb1d6fcf30432fa
Targets
-
-
Target
b563494079d8f625dfd89eafb39c200ae4792e9beec553294fb6014bd61220c8
-
Size
417KB
-
MD5
c9b5ecbffa258e754c83284f1ec2d375
-
SHA1
82c4553df3ba1d25bb8f31d679133ccea881b962
-
SHA256
b563494079d8f625dfd89eafb39c200ae4792e9beec553294fb6014bd61220c8
-
SHA512
5160e424a6cde590e11803780f8ef494662047077f6a69a9097e5ad84c126b896373cae7322857a4da655bb5426434cdbf194724ac0ee48f441ac6a04df18205
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-