General
-
Target
50bc2836e74c97d191533249f007a428
-
Size
364KB
-
Sample
211019-rhvpmaghan
-
MD5
50bc2836e74c97d191533249f007a428
-
SHA1
babd1767e0b52754572d1c2208db2d2bb1cd2891
-
SHA256
60041b714232153e8242343e1ba37d0ea013ce8daeac79f448b1cf96e6ada9a1
-
SHA512
99ff3652397f7ddf63423f00e27a24bda30b1fed6a20af94648926f89a59b5f906ad0775676133da48c28a3e177ba5e517bd6069f37c43b6fe3a74c8ec2c2257
Static task
static1
Behavioral task
behavioral1
Sample
50bc2836e74c97d191533249f007a428.exe
Resource
win7-en-20211014
Malware Config
Extracted
redline
shop
45.9.20.107:46187
Targets
-
-
Target
50bc2836e74c97d191533249f007a428
-
Size
364KB
-
MD5
50bc2836e74c97d191533249f007a428
-
SHA1
babd1767e0b52754572d1c2208db2d2bb1cd2891
-
SHA256
60041b714232153e8242343e1ba37d0ea013ce8daeac79f448b1cf96e6ada9a1
-
SHA512
99ff3652397f7ddf63423f00e27a24bda30b1fed6a20af94648926f89a59b5f906ad0775676133da48c28a3e177ba5e517bd6069f37c43b6fe3a74c8ec2c2257
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-