General
-
Target
dhfdghfg.txt
-
Size
367B
-
Sample
240221-qfnb4aff9t
-
MD5
2cea96feedc8ab4ca821cef05272000d
-
SHA1
a81bb13035dcefb72dbcbf391cef3161556ebcf1
-
SHA256
77762dcc53fdded6721c721958863e71c6b9f8228b5fdc2298ac6cc3a991289d
-
SHA512
f5c69931f74975a32c73a7a276a1757485c673ffc2586ae95b1eacf1d92ab57ae523089d8dfc9808b38b482f777a345e23a828f5b0d0279bea9eb42449498c07
Static task
static1
Behavioral task
behavioral1
Sample
dhfdghfg.txt
Resource
win10v2004-20240220-en
Malware Config
Extracted
redline
@hitok4111
45.15.156.167:80
Targets
-
-
Target
dhfdghfg.txt
-
Size
367B
-
MD5
2cea96feedc8ab4ca821cef05272000d
-
SHA1
a81bb13035dcefb72dbcbf391cef3161556ebcf1
-
SHA256
77762dcc53fdded6721c721958863e71c6b9f8228b5fdc2298ac6cc3a991289d
-
SHA512
f5c69931f74975a32c73a7a276a1757485c673ffc2586ae95b1eacf1d92ab57ae523089d8dfc9808b38b482f777a345e23a828f5b0d0279bea9eb42449498c07
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-