General
-
Target
6fa278abba0d0938d7fbc6fc5cc36407275be3cb8ca54eecd42a971833b1a454
-
Size
305KB
-
Sample
240424-p1z1ysab71
-
MD5
a28daa89e172dee63de8473efc6bbe75
-
SHA1
d00aedb89f4187d25da740da98e7b26eb21690ed
-
SHA256
6fa278abba0d0938d7fbc6fc5cc36407275be3cb8ca54eecd42a971833b1a454
-
SHA512
770ab33fb9b9c6f2ffe1ad6f879433fb2a161a0cc57ec4bde7f44923779ca191b02a696c1ab583f61b9813d6d9679ecac01f1d45d88a2eff7f6edb420ba89334
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
6fa278abba0d0938d7fbc6fc5cc36407275be3cb8ca54eecd42a971833b1a454.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
6fa278abba0d0938d7fbc6fc5cc36407275be3cb8ca54eecd42a971833b1a454
-
Size
305KB
-
MD5
a28daa89e172dee63de8473efc6bbe75
-
SHA1
d00aedb89f4187d25da740da98e7b26eb21690ed
-
SHA256
6fa278abba0d0938d7fbc6fc5cc36407275be3cb8ca54eecd42a971833b1a454
-
SHA512
770ab33fb9b9c6f2ffe1ad6f879433fb2a161a0cc57ec4bde7f44923779ca191b02a696c1ab583f61b9813d6d9679ecac01f1d45d88a2eff7f6edb420ba89334
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-