General
-
Target
ea9798cf7ee7fc6524a4cd372854b9f8d6659440d1ed8b414b317594325ac671.exe
-
Size
105KB
-
Sample
240626-b3zw3sxapf
-
MD5
8cc6364a3e5091abe000b00e452bbbe4
-
SHA1
92567b583b0d6a8c7eeff7972884d323cc17164c
-
SHA256
ea9798cf7ee7fc6524a4cd372854b9f8d6659440d1ed8b414b317594325ac671
-
SHA512
1f4571ae237a88ced9db341a160ae890658d34a85a29c9fb0e04ba17b6f3ec8fb62aeca5e6e03d311c3fa06a0e20b45deb2aa64a8b2cb4358b81d3a1cc88ab6b
-
SSDEEP
1536:ynx6fVLEEwpgZFrEhOJfmJ4l6Ye0yHzw/dLbd39gCy8UyY9YJtPMj5nE1twTJJRQ:+6fVIErtRgYe0yH4Pg/hYQ2SJwAo
Static task
static1
Behavioral task
behavioral1
Sample
ea9798cf7ee7fc6524a4cd372854b9f8d6659440d1ed8b414b317594325ac671.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ea9798cf7ee7fc6524a4cd372854b9f8d6659440d1ed8b414b317594325ac671.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
firstBuild
91.92.241.139:56400
Targets
-
-
Target
ea9798cf7ee7fc6524a4cd372854b9f8d6659440d1ed8b414b317594325ac671.exe
-
Size
105KB
-
MD5
8cc6364a3e5091abe000b00e452bbbe4
-
SHA1
92567b583b0d6a8c7eeff7972884d323cc17164c
-
SHA256
ea9798cf7ee7fc6524a4cd372854b9f8d6659440d1ed8b414b317594325ac671
-
SHA512
1f4571ae237a88ced9db341a160ae890658d34a85a29c9fb0e04ba17b6f3ec8fb62aeca5e6e03d311c3fa06a0e20b45deb2aa64a8b2cb4358b81d3a1cc88ab6b
-
SSDEEP
1536:ynx6fVLEEwpgZFrEhOJfmJ4l6Ye0yHzw/dLbd39gCy8UyY9YJtPMj5nE1twTJJRQ:+6fVIErtRgYe0yH4Pg/hYQ2SJwAo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-