General
-
Target
33c689da9eaa894882cdb0fa90e9bb46.exe
-
Size
568KB
-
Sample
240803-fgs9maycqe
-
MD5
33c689da9eaa894882cdb0fa90e9bb46
-
SHA1
5afc0dc2f90bea1c34acfa37563570afe9db8fb4
-
SHA256
ef0f0472b0aaa446f0bd4ffe6d4d795def72eab197c783d839811200e57c0f08
-
SHA512
68d32de11ddb0b36693ec87782ea6de2c5b8f8b4f5747bce38085a3384674af80e88953a6a9ba78b3acabde9f6198c2442cbb5865954415c26231066761b4251
-
SSDEEP
3072:C1U1cWgzWHY3+zi0ZbYe1g0ujyzdgYLz60gznkI8yQSI8yUrNc5vDA:IccXKHYuG0LahyKv5FEvE
Behavioral task
behavioral1
Sample
33c689da9eaa894882cdb0fa90e9bb46.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
33c689da9eaa894882cdb0fa90e9bb46.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
xxxx
212.224.93.60:51914
Targets
-
-
Target
33c689da9eaa894882cdb0fa90e9bb46.exe
-
Size
568KB
-
MD5
33c689da9eaa894882cdb0fa90e9bb46
-
SHA1
5afc0dc2f90bea1c34acfa37563570afe9db8fb4
-
SHA256
ef0f0472b0aaa446f0bd4ffe6d4d795def72eab197c783d839811200e57c0f08
-
SHA512
68d32de11ddb0b36693ec87782ea6de2c5b8f8b4f5747bce38085a3384674af80e88953a6a9ba78b3acabde9f6198c2442cbb5865954415c26231066761b4251
-
SSDEEP
3072:C1U1cWgzWHY3+zi0ZbYe1g0ujyzdgYLz60gznkI8yQSI8yUrNc5vDA:IccXKHYuG0LahyKv5FEvE
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-