General
-
Target
build.exe
-
Size
95KB
-
Sample
240803-zjp5javcqm
-
MD5
5f3136130610d1fcf980c1256eafe5d6
-
SHA1
704d66cdcbd36913a85d979e4f38de7a62e4b500
-
SHA256
60a40c2c1840c835de64ec8dfb2b25fffc8b6f66106f7a9772f2e40df1132634
-
SHA512
1e8e2988f10641864b2189a0d6e5c0d756836c1defac64c1c2609268c67a642b8e0e52bf313b1b405deaa1cd2a4cc75d731299b90079e8c0045a3d23a1ea2cf4
-
SSDEEP
1536:BqsUWqm2lbG6jejoigI743Ywzi0Zb78ivombfexv0ujXyyed243teulgS6pUl:vXB+Y7+zi0ZbYe1g0ujyzdGU
Behavioral task
behavioral1
Sample
build.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
build.exe
Resource
win11-20240802-en
Malware Config
Extracted
redline
cheat
cwel.tecnessino.xyz:38905
Targets
-
-
Target
build.exe
-
Size
95KB
-
MD5
5f3136130610d1fcf980c1256eafe5d6
-
SHA1
704d66cdcbd36913a85d979e4f38de7a62e4b500
-
SHA256
60a40c2c1840c835de64ec8dfb2b25fffc8b6f66106f7a9772f2e40df1132634
-
SHA512
1e8e2988f10641864b2189a0d6e5c0d756836c1defac64c1c2609268c67a642b8e0e52bf313b1b405deaa1cd2a4cc75d731299b90079e8c0045a3d23a1ea2cf4
-
SSDEEP
1536:BqsUWqm2lbG6jejoigI743Ywzi0Zb78ivombfexv0ujXyyed243teulgS6pUl:vXB+Y7+zi0ZbYe1g0ujyzdGU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-