General
-
Target
92e13766256632bced366751543252ccc72a9b82fdacdfd95e0074309e1aa25e
-
Size
349KB
-
Sample
230403-cj1vpscc38
-
MD5
b639bd399837f1e0c1424313f0f1a18e
-
SHA1
a53c3f3b5480e89831d1a30793d8164993ab3a07
-
SHA256
92e13766256632bced366751543252ccc72a9b82fdacdfd95e0074309e1aa25e
-
SHA512
a8547cf231497b8ff89055aa8e1a76b21fb9b55d29ea0c68313579bee07cd7fbc625fd127de6f8dd3ef7221c174d2b409553f8e2c71ff62f840fe2018736d11b
-
SSDEEP
6144:0bbh/s/Lo35Gj2ikE8eMMH3hvRmgcZYKlXpGg5HTSMJYBQj1m/1:2h/cM35GqHuhvRmFZYKRog5HTnJv1M1
Static task
static1
Malware Config
Extracted
redline
1WEEK
116.203.35.84:1417
-
auth_value
1ea1af49193699ff9d39f89add353566
Targets
-
-
Target
92e13766256632bced366751543252ccc72a9b82fdacdfd95e0074309e1aa25e
-
Size
349KB
-
MD5
b639bd399837f1e0c1424313f0f1a18e
-
SHA1
a53c3f3b5480e89831d1a30793d8164993ab3a07
-
SHA256
92e13766256632bced366751543252ccc72a9b82fdacdfd95e0074309e1aa25e
-
SHA512
a8547cf231497b8ff89055aa8e1a76b21fb9b55d29ea0c68313579bee07cd7fbc625fd127de6f8dd3ef7221c174d2b409553f8e2c71ff62f840fe2018736d11b
-
SSDEEP
6144:0bbh/s/Lo35Gj2ikE8eMMH3hvRmgcZYKlXpGg5HTSMJYBQj1m/1:2h/cM35GqHuhvRmFZYKRog5HTnJv1M1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-