General
-
Target
7fe6ab4b50235ba27649f8bd780c20954d98becb6ee904b1d0974d399127c2ca
-
Size
314KB
-
Sample
220806-f1k3csahhq
-
MD5
6f7e704176330dde7679fc4efa683990
-
SHA1
c88c6256a7bfb0b70b24e9861cfdd773c25348e0
-
SHA256
7fe6ab4b50235ba27649f8bd780c20954d98becb6ee904b1d0974d399127c2ca
-
SHA512
65a5f673618d2dab94b086927781728196ce35c789e96b661dfd7d565950d62d94b37a063b677e10fc15635eae457eb07c3fc7ebb27b971eddfd1efe2c4240e9
Static task
static1
Malware Config
Extracted
redline
AF2
stcontact.top:80
-
auth_value
4d729a2faecb406a0eb1d6fcf30432fa
Targets
-
-
Target
7fe6ab4b50235ba27649f8bd780c20954d98becb6ee904b1d0974d399127c2ca
-
Size
314KB
-
MD5
6f7e704176330dde7679fc4efa683990
-
SHA1
c88c6256a7bfb0b70b24e9861cfdd773c25348e0
-
SHA256
7fe6ab4b50235ba27649f8bd780c20954d98becb6ee904b1d0974d399127c2ca
-
SHA512
65a5f673618d2dab94b086927781728196ce35c789e96b661dfd7d565950d62d94b37a063b677e10fc15635eae457eb07c3fc7ebb27b971eddfd1efe2c4240e9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-