General
-
Target
de36e0d6cb3a54202d2aca80ed22127bb3696b56db90a9fb39122df32229cae3
-
Size
369KB
-
Sample
220913-gm3kxsaeeq
-
MD5
5dc7782817c3278f30317e703e61ade8
-
SHA1
be19390b4afcb9166d17ca674ad2ed0f2669ab23
-
SHA256
de36e0d6cb3a54202d2aca80ed22127bb3696b56db90a9fb39122df32229cae3
-
SHA512
22aedf0a69f807bf41b10ae5307998dfb5245128f91a1c27d05f8f1d10357df295e42da3822bd43841bf533ee1d119f38bf242aea0ace1fb0c1d24a9a6a401f8
-
SSDEEP
6144:IXEZPSLM1h2M8l/86ohioYooKn5mZNeiUt1bdyzk+rIHm/WX3xid:I2PV1h2JV86ohioYk5mZNeioZ1OMyWnx
Static task
static1
Malware Config
Extracted
redline
twick
trustedwicky.com:80
-
auth_value
2284521981f16053dae08194ef371cb3
Targets
-
-
Target
de36e0d6cb3a54202d2aca80ed22127bb3696b56db90a9fb39122df32229cae3
-
Size
369KB
-
MD5
5dc7782817c3278f30317e703e61ade8
-
SHA1
be19390b4afcb9166d17ca674ad2ed0f2669ab23
-
SHA256
de36e0d6cb3a54202d2aca80ed22127bb3696b56db90a9fb39122df32229cae3
-
SHA512
22aedf0a69f807bf41b10ae5307998dfb5245128f91a1c27d05f8f1d10357df295e42da3822bd43841bf533ee1d119f38bf242aea0ace1fb0c1d24a9a6a401f8
-
SSDEEP
6144:IXEZPSLM1h2M8l/86ohioYooKn5mZNeiUt1bdyzk+rIHm/WX3xid:I2PV1h2JV86ohioYk5mZNeioZ1OMyWnx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-