General
-
Target
6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938
-
Size
287KB
-
Sample
230212-vsgsaseg3v
-
MD5
5679820c359decb6148df7d1f99dbf24
-
SHA1
afc2c0c251e62bdcfa1b53ae4f228ba8d734ee9f
-
SHA256
6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938
-
SHA512
71d465a2e6accb08a50dc8545792df0c0dd2ea67c06be3462448ce4d76166c12214a8e8b99d994a7303d8b9b7c6f8974b01aa5af206f3f2eed4e59b503731aa9
-
SSDEEP
6144:AtLrW/o0QaE0UeUCXLfZEKaTovPOmCX0oAWv:AlqQx0HLeK8ovWmM0oAW
Static task
static1
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938
-
Size
287KB
-
MD5
5679820c359decb6148df7d1f99dbf24
-
SHA1
afc2c0c251e62bdcfa1b53ae4f228ba8d734ee9f
-
SHA256
6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938
-
SHA512
71d465a2e6accb08a50dc8545792df0c0dd2ea67c06be3462448ce4d76166c12214a8e8b99d994a7303d8b9b7c6f8974b01aa5af206f3f2eed4e59b503731aa9
-
SSDEEP
6144:AtLrW/o0QaE0UeUCXLfZEKaTovPOmCX0oAWv:AlqQx0HLeK8ovWmM0oAW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-