General
-
Target
e90a83200f37f7895ee404c2b4279e13d2b51f488379687b3ee2f90211d6d7a7
-
Size
691KB
-
Sample
231127-frrhsaee7x
-
MD5
e02a0537969f2033db84a15927015f20
-
SHA1
c74a1b60eb95b203d6fc7becd5fd7eceb2ca29d3
-
SHA256
e90a83200f37f7895ee404c2b4279e13d2b51f488379687b3ee2f90211d6d7a7
-
SHA512
0c9cc0a7fd20459d5a7356738c470d5b034560becb70dfeb8740f4145555302a7dd2ae35fc0fdbf6b0a111806ee6028a90dc9903a8671d67754c01ca0ea54ce4
-
SSDEEP
6144:/rb9JXJ+MoAK16fvlscd/OmQ4+8leY13YpaZ+brKMFNlITQnV/digUaDlSBBu4EK:j5++WAFd/88leWYpU+37FDIT28RaDTq
Static task
static1
Behavioral task
behavioral1
Sample
e90a83200f37f7895ee404c2b4279e13d2b51f488379687b3ee2f90211d6d7a7.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
e90a83200f37f7895ee404c2b4279e13d2b51f488379687b3ee2f90211d6d7a7.exe
Resource
win10-20231023-en
Malware Config
Targets
-
-
Target
e90a83200f37f7895ee404c2b4279e13d2b51f488379687b3ee2f90211d6d7a7
-
Size
691KB
-
MD5
e02a0537969f2033db84a15927015f20
-
SHA1
c74a1b60eb95b203d6fc7becd5fd7eceb2ca29d3
-
SHA256
e90a83200f37f7895ee404c2b4279e13d2b51f488379687b3ee2f90211d6d7a7
-
SHA512
0c9cc0a7fd20459d5a7356738c470d5b034560becb70dfeb8740f4145555302a7dd2ae35fc0fdbf6b0a111806ee6028a90dc9903a8671d67754c01ca0ea54ce4
-
SSDEEP
6144:/rb9JXJ+MoAK16fvlscd/OmQ4+8leY13YpaZ+brKMFNlITQnV/digUaDlSBBu4EK:j5++WAFd/88leWYpU+37FDIT28RaDTq
-
Raccoon Stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-