General
-
Target
ef6721cf0bd7437d8bca647ead8f0120N.exe
-
Size
95KB
-
Sample
240804-qs46da1ang
-
MD5
ef6721cf0bd7437d8bca647ead8f0120
-
SHA1
7a2bd21a58d9a468380a47dfd81505b56cce613b
-
SHA256
0ed605c6122fa4b3d84e89dd3dde7e3fca0aef0687935c1201f55d31a594d56b
-
SHA512
70f28c80f7beebe6df040b07dcc782245d71a93102041c971c1cdfaeed2e8556fe3f641201486b7bbfbb30f6c511a678cf499328911a8c8d66ef2be16affb076
-
SSDEEP
1536:9qs+NqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2oteulgS6pY:rqMOY3+zi0ZbYe1g0ujyzdoY
Behavioral task
behavioral1
Sample
ef6721cf0bd7437d8bca647ead8f0120N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef6721cf0bd7437d8bca647ead8f0120N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
Second
51.89.201.41:29254
Targets
-
-
Target
ef6721cf0bd7437d8bca647ead8f0120N.exe
-
Size
95KB
-
MD5
ef6721cf0bd7437d8bca647ead8f0120
-
SHA1
7a2bd21a58d9a468380a47dfd81505b56cce613b
-
SHA256
0ed605c6122fa4b3d84e89dd3dde7e3fca0aef0687935c1201f55d31a594d56b
-
SHA512
70f28c80f7beebe6df040b07dcc782245d71a93102041c971c1cdfaeed2e8556fe3f641201486b7bbfbb30f6c511a678cf499328911a8c8d66ef2be16affb076
-
SSDEEP
1536:9qs+NqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2oteulgS6pY:rqMOY3+zi0ZbYe1g0ujyzdoY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-