General
-
Target
d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3
-
Size
456KB
-
Sample
230210-mtgjxsbh74
-
MD5
38843698815444b78bb8a73cb2a55e1c
-
SHA1
823d3bca57c0ef79b64b736e0b856b15eb8a1427
-
SHA256
d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3
-
SHA512
86ec0f5bc0fed715b9e9298c6c75ac97fca05e9cee217f9452c50dc54eda35c7099fa2cd751a501036068d1455632d86d5e33b126767626bafd641e4b9d0b57f
-
SSDEEP
6144:q0lu6aSHczn//H4D6HMbPFn21BxBdrnfWxj6T/:qVSGU6HM7RMBnfWY/
Static task
static1
Malware Config
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Targets
-
-
Target
d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3
-
Size
456KB
-
MD5
38843698815444b78bb8a73cb2a55e1c
-
SHA1
823d3bca57c0ef79b64b736e0b856b15eb8a1427
-
SHA256
d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3
-
SHA512
86ec0f5bc0fed715b9e9298c6c75ac97fca05e9cee217f9452c50dc54eda35c7099fa2cd751a501036068d1455632d86d5e33b126767626bafd641e4b9d0b57f
-
SSDEEP
6144:q0lu6aSHczn//H4D6HMbPFn21BxBdrnfWxj6T/:qVSGU6HM7RMBnfWY/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-