General
-
Target
d1bcf8f50682db1678408a7c7f183a7cffe8e078e02dc7a17c71ab9fe3d2b9e4
-
Size
305KB
-
Sample
240424-nzwfpshe54
-
MD5
74af9ea5a40a4a37d46f25da5b647d30
-
SHA1
a2e6545d7e46990aef99a7078819d34abf2ada8d
-
SHA256
d1bcf8f50682db1678408a7c7f183a7cffe8e078e02dc7a17c71ab9fe3d2b9e4
-
SHA512
0c10628fd9b885e715ffc6fab9bc2cc8b89820fc42920daec25246ed5cb657cd359a29d15019f3c29be1c3df995fc9590fafb9f2754be6456fa68b5936112d49
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
d1bcf8f50682db1678408a7c7f183a7cffe8e078e02dc7a17c71ab9fe3d2b9e4.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
d1bcf8f50682db1678408a7c7f183a7cffe8e078e02dc7a17c71ab9fe3d2b9e4
-
Size
305KB
-
MD5
74af9ea5a40a4a37d46f25da5b647d30
-
SHA1
a2e6545d7e46990aef99a7078819d34abf2ada8d
-
SHA256
d1bcf8f50682db1678408a7c7f183a7cffe8e078e02dc7a17c71ab9fe3d2b9e4
-
SHA512
0c10628fd9b885e715ffc6fab9bc2cc8b89820fc42920daec25246ed5cb657cd359a29d15019f3c29be1c3df995fc9590fafb9f2754be6456fa68b5936112d49
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-