General
-
Target
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe
-
Size
95KB
-
Sample
240801-ctltja1eph
-
MD5
25c305d127aba1ca0802f96df1894c8b
-
SHA1
93f08869422ff5110f363fd62d457fff9a013718
-
SHA256
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650
-
SHA512
72be8d364f22514cdf2d85e0addbd881074b36e4266d376b1485b27d7356a0d6e39af6a290894ea38bd0e079add2fe620d3594f0d71cd4f2a333ba7aaccf471b
-
SSDEEP
1536:5qs+bqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2Y3tmulgS6p8l:XIwiYj+zi0ZbYe1g0ujyzdC8
Behavioral task
behavioral1
Sample
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
redline
svchost
157.66.25.16:47818
Targets
-
-
Target
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe
-
Size
95KB
-
MD5
25c305d127aba1ca0802f96df1894c8b
-
SHA1
93f08869422ff5110f363fd62d457fff9a013718
-
SHA256
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650
-
SHA512
72be8d364f22514cdf2d85e0addbd881074b36e4266d376b1485b27d7356a0d6e39af6a290894ea38bd0e079add2fe620d3594f0d71cd4f2a333ba7aaccf471b
-
SSDEEP
1536:5qs+bqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2Y3tmulgS6p8l:XIwiYj+zi0ZbYe1g0ujyzdC8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-