General
-
Target
29e48b804fdd24ac7bfaa4a32baaa82c51472cd7a2cbbc33c29e75a2dbeaa64a
-
Size
308KB
-
Sample
210727-mly3gwhr82
-
MD5
6547dbaf4dd24009a975865f24485580
-
SHA1
228defd30330490a5d956100fddec122c7a723dd
-
SHA256
29e48b804fdd24ac7bfaa4a32baaa82c51472cd7a2cbbc33c29e75a2dbeaa64a
-
SHA512
76e2f2d3aa363f53001c233cfb47224b6fed1eb89a80acec438eb2ef508345c3221ac05f0db26bfb372815af5ec333ba032a8271f68a97087dc00995943ffa73
Static task
static1
Behavioral task
behavioral1
Sample
29e48b804fdd24ac7bfaa4a32baaa82c51472cd7a2cbbc33c29e75a2dbeaa64a.exe
Resource
win10v20210408
Malware Config
Extracted
redline
SewPalpadin
185.215.113.114:8887
Targets
-
-
Target
29e48b804fdd24ac7bfaa4a32baaa82c51472cd7a2cbbc33c29e75a2dbeaa64a
-
Size
308KB
-
MD5
6547dbaf4dd24009a975865f24485580
-
SHA1
228defd30330490a5d956100fddec122c7a723dd
-
SHA256
29e48b804fdd24ac7bfaa4a32baaa82c51472cd7a2cbbc33c29e75a2dbeaa64a
-
SHA512
76e2f2d3aa363f53001c233cfb47224b6fed1eb89a80acec438eb2ef508345c3221ac05f0db26bfb372815af5ec333ba032a8271f68a97087dc00995943ffa73
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-