General
-
Target
6feae33a71eee9de837694b7e0f71127c6a400a4c9cdd2fa0361bc4dfd725e27
-
Size
305KB
-
Sample
240424-mz62rsha4v
-
MD5
cda5506857a545008fb0ff1b3be0e25f
-
SHA1
04a108faee40c382841c082e58663f951376aad0
-
SHA256
6feae33a71eee9de837694b7e0f71127c6a400a4c9cdd2fa0361bc4dfd725e27
-
SHA512
bce3004b627f6f9f564ac2f463ca790b716ca645f4fa1247dc3b680b80c3f55b8b405d27c600575569dc6ca0ae2cf9b93aec11a569664002b53912f9faeebb92
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
6feae33a71eee9de837694b7e0f71127c6a400a4c9cdd2fa0361bc4dfd725e27.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
6feae33a71eee9de837694b7e0f71127c6a400a4c9cdd2fa0361bc4dfd725e27
-
Size
305KB
-
MD5
cda5506857a545008fb0ff1b3be0e25f
-
SHA1
04a108faee40c382841c082e58663f951376aad0
-
SHA256
6feae33a71eee9de837694b7e0f71127c6a400a4c9cdd2fa0361bc4dfd725e27
-
SHA512
bce3004b627f6f9f564ac2f463ca790b716ca645f4fa1247dc3b680b80c3f55b8b405d27c600575569dc6ca0ae2cf9b93aec11a569664002b53912f9faeebb92
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-