General
-
Target
HWID-MAC-spoofer.exe
-
Size
399KB
-
Sample
230919-mz6e8sae94
-
MD5
b425e2d0886e0ee0745da03ecd220de8
-
SHA1
7434dff58d065bfbdd8b6801f6acf16cc98ff6a0
-
SHA256
c66bdd13991056406e9b0ad4c861decb6f663d22f78d2acd6bd3c41155b52e1d
-
SHA512
b827c6b5aa10c168922a4f8768ab33ad23456586f8d01443fe53e8c12b72e042566ffcb731e9713fc1b87063ac507490a519d31f53566b69f617cc1b742dcac5
-
SSDEEP
12288:ggCeqiG59ouccB05TuDiHL7HyrPhsJjSYzy5kD1Sa:ggCZ5lMu2KLYzy5ss
Static task
static1
Behavioral task
behavioral1
Sample
HWID-MAC-spoofer.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
HWID-MAC-spoofer.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
@hotmine330
94.142.138.4:80
-
auth_value
ee23d2e4ba79ff008c466af0086bd594
Targets
-
-
Target
HWID-MAC-spoofer.exe
-
Size
399KB
-
MD5
b425e2d0886e0ee0745da03ecd220de8
-
SHA1
7434dff58d065bfbdd8b6801f6acf16cc98ff6a0
-
SHA256
c66bdd13991056406e9b0ad4c861decb6f663d22f78d2acd6bd3c41155b52e1d
-
SHA512
b827c6b5aa10c168922a4f8768ab33ad23456586f8d01443fe53e8c12b72e042566ffcb731e9713fc1b87063ac507490a519d31f53566b69f617cc1b742dcac5
-
SSDEEP
12288:ggCeqiG59ouccB05TuDiHL7HyrPhsJjSYzy5kD1Sa:ggCZ5lMu2KLYzy5ss
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-