General
-
Target
6aada7ae2930adc1e1f648c2c0d80225c1b77fcc581ce8399d68b44e58db5a25
-
Size
306KB
-
Sample
240424-qs1g7aag37
-
MD5
689a30669bf8895ee66c7535fd7d7fb8
-
SHA1
a226f92c3eaa663ec028581f3a812266371491f1
-
SHA256
6aada7ae2930adc1e1f648c2c0d80225c1b77fcc581ce8399d68b44e58db5a25
-
SHA512
56f8ecc05c128b3f035c5b612e861beff2b1f2cdbf3c5bebd768e834e5ce00bfa481b7fe15c161367754bf5f65ee8a14bed76fc9b1d7a54cfe7bd2b6f02951c4
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
6aada7ae2930adc1e1f648c2c0d80225c1b77fcc581ce8399d68b44e58db5a25.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
6aada7ae2930adc1e1f648c2c0d80225c1b77fcc581ce8399d68b44e58db5a25
-
Size
306KB
-
MD5
689a30669bf8895ee66c7535fd7d7fb8
-
SHA1
a226f92c3eaa663ec028581f3a812266371491f1
-
SHA256
6aada7ae2930adc1e1f648c2c0d80225c1b77fcc581ce8399d68b44e58db5a25
-
SHA512
56f8ecc05c128b3f035c5b612e861beff2b1f2cdbf3c5bebd768e834e5ce00bfa481b7fe15c161367754bf5f65ee8a14bed76fc9b1d7a54cfe7bd2b6f02951c4
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-