General
-
Target
ca3ef12ec1c7d313da0b52e566c6b3872afb92f98d3bc033b862606f0dd08ed8
-
Size
305KB
-
Sample
240424-pn445shh39
-
MD5
3c03aae8c7d6cbd78b0c476e2ed88c13
-
SHA1
c3237e645a9ea9caa554dd2cc01f2bc41c11940d
-
SHA256
ca3ef12ec1c7d313da0b52e566c6b3872afb92f98d3bc033b862606f0dd08ed8
-
SHA512
e85bcf44e9f79334154430911c521a518c1c6f55ade36d16b0711558d92b0bb2ed40328d5e3161b5343074c8e09511ecd7e035c42554ec59167053b08d27665b
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
ca3ef12ec1c7d313da0b52e566c6b3872afb92f98d3bc033b862606f0dd08ed8.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
ca3ef12ec1c7d313da0b52e566c6b3872afb92f98d3bc033b862606f0dd08ed8
-
Size
305KB
-
MD5
3c03aae8c7d6cbd78b0c476e2ed88c13
-
SHA1
c3237e645a9ea9caa554dd2cc01f2bc41c11940d
-
SHA256
ca3ef12ec1c7d313da0b52e566c6b3872afb92f98d3bc033b862606f0dd08ed8
-
SHA512
e85bcf44e9f79334154430911c521a518c1c6f55ade36d16b0711558d92b0bb2ed40328d5e3161b5343074c8e09511ecd7e035c42554ec59167053b08d27665b
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-