General
-
Target
ac16aef5f130b079dd3de8aef4ae58ed17a4b746488a7f3dfaea6981e03fccd0
-
Size
305KB
-
Sample
240424-nzcctshe2z
-
MD5
783f3a03c9986dd0e5d9a4357f397cb6
-
SHA1
4945bc0598fe9df5b5dd010f5c22f649c074169d
-
SHA256
ac16aef5f130b079dd3de8aef4ae58ed17a4b746488a7f3dfaea6981e03fccd0
-
SHA512
97c7fdbc2733dce9f7c9988a1f19f85091f56190a6866e90a76d4f535cfda2d4f6dac48e5c0cb71d3efddc7777894b4be80b9179f715b5b9b866dceabf67f54b
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
ac16aef5f130b079dd3de8aef4ae58ed17a4b746488a7f3dfaea6981e03fccd0.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
ac16aef5f130b079dd3de8aef4ae58ed17a4b746488a7f3dfaea6981e03fccd0.exe
Resource
win11-20240412-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
ac16aef5f130b079dd3de8aef4ae58ed17a4b746488a7f3dfaea6981e03fccd0
-
Size
305KB
-
MD5
783f3a03c9986dd0e5d9a4357f397cb6
-
SHA1
4945bc0598fe9df5b5dd010f5c22f649c074169d
-
SHA256
ac16aef5f130b079dd3de8aef4ae58ed17a4b746488a7f3dfaea6981e03fccd0
-
SHA512
97c7fdbc2733dce9f7c9988a1f19f85091f56190a6866e90a76d4f535cfda2d4f6dac48e5c0cb71d3efddc7777894b4be80b9179f715b5b9b866dceabf67f54b
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-