General
-
Target
5013e1431d6093c3e3525b476d524484760eb70f0a985ff27abf6dde14e3d8cc
-
Size
305KB
-
Sample
240424-nd39eshb6y
-
MD5
2f113691e531cfd6dd35772d96d550a4
-
SHA1
2dda497ed27f075af84023d6ccd2bd4c7a9f3a89
-
SHA256
5013e1431d6093c3e3525b476d524484760eb70f0a985ff27abf6dde14e3d8cc
-
SHA512
e2dbdcce97b0620e9207dfa697240b4bcade6fa2c100df32f8f38c0b8c710f683dc94fc863a610bc633a294291e529aa0576a17c4812b560c6f42d8f6cb8b1ea
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
5013e1431d6093c3e3525b476d524484760eb70f0a985ff27abf6dde14e3d8cc.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
5013e1431d6093c3e3525b476d524484760eb70f0a985ff27abf6dde14e3d8cc
-
Size
305KB
-
MD5
2f113691e531cfd6dd35772d96d550a4
-
SHA1
2dda497ed27f075af84023d6ccd2bd4c7a9f3a89
-
SHA256
5013e1431d6093c3e3525b476d524484760eb70f0a985ff27abf6dde14e3d8cc
-
SHA512
e2dbdcce97b0620e9207dfa697240b4bcade6fa2c100df32f8f38c0b8c710f683dc94fc863a610bc633a294291e529aa0576a17c4812b560c6f42d8f6cb8b1ea
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-