General
-
Target
25c305d127aba1ca0802f96df1894c8b.bin
-
Size
43KB
-
Sample
240802-b3ldpaxhqk
-
MD5
6f6b2f4a751734703a23d360b0572c27
-
SHA1
e5d3242dc31eb8f3b0384ba98b377c9a605943db
-
SHA256
7b46dadda1669480cf7efd536ac13b6836d19970a1037f81b5ed98bcc28f6c92
-
SHA512
f373b87df1b807e650a8508eb687729747e50200c9685d13e8c4b142b46ea0bd5f830b5a8a25f997cd2e2c5f5f02820550cb18a9a3cc364bec27e73e64284061
-
SSDEEP
768:yDtveBeU2oP9hf0hqiaDfygLyVlv6Zb6Xj6x/pXtWAkin3/nt+exJeazmfJ:WRSxlqKKNf6hNtWAk63/nAaifJ
Behavioral task
behavioral1
Sample
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
redline
svchost
157.66.25.16:47818
Targets
-
-
Target
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe
-
Size
95KB
-
MD5
25c305d127aba1ca0802f96df1894c8b
-
SHA1
93f08869422ff5110f363fd62d457fff9a013718
-
SHA256
eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650
-
SHA512
72be8d364f22514cdf2d85e0addbd881074b36e4266d376b1485b27d7356a0d6e39af6a290894ea38bd0e079add2fe620d3594f0d71cd4f2a333ba7aaccf471b
-
SSDEEP
1536:5qs+bqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2Y3tmulgS6p8l:XIwiYj+zi0ZbYe1g0ujyzdC8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-