General
-
Target
2e0561061a4d0df3d3c35e4adb69160e01ba80a9dca58588a82eb50d50990e13
-
Size
306KB
-
Sample
240424-spwe6scc6z
-
MD5
50e59e825e715213d1cf6fa8382201fb
-
SHA1
5eedc11aba6d17ca5f1aca29004d3df1e63b8d19
-
SHA256
2e0561061a4d0df3d3c35e4adb69160e01ba80a9dca58588a82eb50d50990e13
-
SHA512
8af88f3bffdba910131df562f5bd59ff6b9fbf29f2c27354c4331b0e0546d4002f031b3a4c1774d320a1c48b150b29c662e4d4110c6c74dbe48d1df059f1ebe7
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
Behavioral task
behavioral1
Sample
2e0561061a4d0df3d3c35e4adb69160e01ba80a9dca58588a82eb50d50990e13.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
2e0561061a4d0df3d3c35e4adb69160e01ba80a9dca58588a82eb50d50990e13.exe
Resource
win11-20240412-en
Malware Config
Extracted
redline
spoo
103.113.70.99:2630
Targets
-
-
Target
2e0561061a4d0df3d3c35e4adb69160e01ba80a9dca58588a82eb50d50990e13
-
Size
306KB
-
MD5
50e59e825e715213d1cf6fa8382201fb
-
SHA1
5eedc11aba6d17ca5f1aca29004d3df1e63b8d19
-
SHA256
2e0561061a4d0df3d3c35e4adb69160e01ba80a9dca58588a82eb50d50990e13
-
SHA512
8af88f3bffdba910131df562f5bd59ff6b9fbf29f2c27354c4331b0e0546d4002f031b3a4c1774d320a1c48b150b29c662e4d4110c6c74dbe48d1df059f1ebe7
-
SSDEEP
6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-