General
-
Target
68c5f8370179ad11bb5792db61d30566218c146a329970148c82f8fb21b90c49
-
Size
306KB
-
Sample
240424-q62meabb2s
-
MD5
35d485f0d0623cca84c6a1e568a92dfe
-
SHA1
32f312b14eae0d3ec7b294731c45aba3a98cccd2
-
SHA256
68c5f8370179ad11bb5792db61d30566218c146a329970148c82f8fb21b90c49
-
SHA512
73b805ca80854362b3c0529904449edb1a2907ac95d5344e13155558534783ab8f78b74df7426e8b674ad25bda409abbbd3f62bab1d6ce7475b269aae0128354
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
68c5f8370179ad11bb5792db61d30566218c146a329970148c82f8fb21b90c49.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
68c5f8370179ad11bb5792db61d30566218c146a329970148c82f8fb21b90c49
-
Size
306KB
-
MD5
35d485f0d0623cca84c6a1e568a92dfe
-
SHA1
32f312b14eae0d3ec7b294731c45aba3a98cccd2
-
SHA256
68c5f8370179ad11bb5792db61d30566218c146a329970148c82f8fb21b90c49
-
SHA512
73b805ca80854362b3c0529904449edb1a2907ac95d5344e13155558534783ab8f78b74df7426e8b674ad25bda409abbbd3f62bab1d6ce7475b269aae0128354
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-