General
-
Target
de24892480214135059a97b939c481e09cd6f194605327a270383959b0f88b55
-
Size
304KB
-
Sample
240424-mv5m5sha64
-
MD5
5a672c3032df567d5e35783135e69b35
-
SHA1
b6eeb911a2a9ab852c4cde7b5224447b09438c17
-
SHA256
de24892480214135059a97b939c481e09cd6f194605327a270383959b0f88b55
-
SHA512
2ca0dbcc6359f372042624dc76520723bb03dbc403751d71d5eff2d93804de2f06dfbedf926d82e4f3674e72413f8f8966dfcb2d4455961d40e2121f16c44707
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
de24892480214135059a97b939c481e09cd6f194605327a270383959b0f88b55.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
de24892480214135059a97b939c481e09cd6f194605327a270383959b0f88b55
-
Size
304KB
-
MD5
5a672c3032df567d5e35783135e69b35
-
SHA1
b6eeb911a2a9ab852c4cde7b5224447b09438c17
-
SHA256
de24892480214135059a97b939c481e09cd6f194605327a270383959b0f88b55
-
SHA512
2ca0dbcc6359f372042624dc76520723bb03dbc403751d71d5eff2d93804de2f06dfbedf926d82e4f3674e72413f8f8966dfcb2d4455961d40e2121f16c44707
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-