General
-
Target
f8e477d0a804d50fe73b9a60f0194ea66aa936dbf4876ce99a24ecd1c4c6882a
-
Size
304KB
-
Sample
240424-mwehcaha66
-
MD5
df94ee3c1612141d58994201d34e1294
-
SHA1
99b6e68855440829f4380d5202f5de4c0f5e2722
-
SHA256
f8e477d0a804d50fe73b9a60f0194ea66aa936dbf4876ce99a24ecd1c4c6882a
-
SHA512
0cd5303014b1262f806e4b034c6ac133ad497ed03a4758c3be640b46490a418b4d9e9f58c0dccb82488e6470a792caa3ed569cf0d2c3a9a77ff984fcd01a8cd9
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
f8e477d0a804d50fe73b9a60f0194ea66aa936dbf4876ce99a24ecd1c4c6882a.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
f8e477d0a804d50fe73b9a60f0194ea66aa936dbf4876ce99a24ecd1c4c6882a
-
Size
304KB
-
MD5
df94ee3c1612141d58994201d34e1294
-
SHA1
99b6e68855440829f4380d5202f5de4c0f5e2722
-
SHA256
f8e477d0a804d50fe73b9a60f0194ea66aa936dbf4876ce99a24ecd1c4c6882a
-
SHA512
0cd5303014b1262f806e4b034c6ac133ad497ed03a4758c3be640b46490a418b4d9e9f58c0dccb82488e6470a792caa3ed569cf0d2c3a9a77ff984fcd01a8cd9
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-