General
-
Target
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0_payload.exe
-
Size
95KB
-
Sample
240715-3qj4msxfrd
-
MD5
517c949f1f22d780b8a2d4efb4ac92ac
-
SHA1
aff8a87b61eac55358ef51d5954f38a0edea1798
-
SHA256
fdf7c12f0a27c062abdc5d39b606c2253b393633183f88d546bf6678c4ef27dd
-
SHA512
8a12a3e09a4c0bfb4004244f0156a8b9fd865d7bc72841599a1a5154d50039e23c6039d5e507b05ecb313d04297db5106fc4d7fc41f7bef883b345eb4b358d5d
-
SSDEEP
1536:5qsCOqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2YteulgS6p8l:X1uOYj+zi0ZbYe1g0ujyzd48
Behavioral task
behavioral1
Sample
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0_payload.exe
Resource
win7-20240708-en
Malware Config
Extracted
redline
unk777
159.203.177.31:16383
Targets
-
-
Target
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0_payload.exe
-
Size
95KB
-
MD5
517c949f1f22d780b8a2d4efb4ac92ac
-
SHA1
aff8a87b61eac55358ef51d5954f38a0edea1798
-
SHA256
fdf7c12f0a27c062abdc5d39b606c2253b393633183f88d546bf6678c4ef27dd
-
SHA512
8a12a3e09a4c0bfb4004244f0156a8b9fd865d7bc72841599a1a5154d50039e23c6039d5e507b05ecb313d04297db5106fc4d7fc41f7bef883b345eb4b358d5d
-
SSDEEP
1536:5qsCOqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2YteulgS6p8l:X1uOYj+zi0ZbYe1g0ujyzd48
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-