General
-
Target
f7cdeca8685357f0430728d8c641200d6b67b5060341e71d93a40d0d08ed5351
-
Size
309KB
-
Sample
220907-f1sgfabba8
-
MD5
a87e8d6fbdfb50309958555dbd50ed6d
-
SHA1
4f79763a2c6e40cec5bae55176274691b3c31dc9
-
SHA256
f7cdeca8685357f0430728d8c641200d6b67b5060341e71d93a40d0d08ed5351
-
SHA512
190a53b670427f778b27de197de327e1f7bb99458f2f73e3b5f8111ff2de9677202ea09c6ae32102c4b43fec6c32b271bbdb6a78f33b644419dd9c4fe9a3708c
-
SSDEEP
6144:mjFyGCxDDlxd71dlDoSKbv0DakweuWRsDDZH:mjtC9DdlD9KT0wrWRYl
Static task
static1
Malware Config
Extracted
redline
twick
trustedwicky.com:80
-
auth_value
2284521981f16053dae08194ef371cb3
Targets
-
-
Target
f7cdeca8685357f0430728d8c641200d6b67b5060341e71d93a40d0d08ed5351
-
Size
309KB
-
MD5
a87e8d6fbdfb50309958555dbd50ed6d
-
SHA1
4f79763a2c6e40cec5bae55176274691b3c31dc9
-
SHA256
f7cdeca8685357f0430728d8c641200d6b67b5060341e71d93a40d0d08ed5351
-
SHA512
190a53b670427f778b27de197de327e1f7bb99458f2f73e3b5f8111ff2de9677202ea09c6ae32102c4b43fec6c32b271bbdb6a78f33b644419dd9c4fe9a3708c
-
SSDEEP
6144:mjFyGCxDDlxd71dlDoSKbv0DakweuWRsDDZH:mjtC9DdlD9KT0wrWRYl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-