General
-
Target
e4d67649c7704c50925bcd3fe6ac345cba54d118407f28f6550b398671b0284e.exe
-
Size
95KB
-
Sample
240805-cb94eatdpj
-
MD5
4622038cc281fbc35d0cfce6c5a595e3
-
SHA1
6f68e253ba656556e0eac9c4dafe6fdadb4c39f9
-
SHA256
e4d67649c7704c50925bcd3fe6ac345cba54d118407f28f6550b398671b0284e
-
SHA512
f5114998a7cfb51a7dec1477b2b3a026fd5a504ac9d4a16bb761ae09fe55074468944a5aaf7c66ed5c67aefdab2b62ca544a3b22ac7d245a0c9ffd11a8c298f3
-
SSDEEP
1536:Oqs+EqJ8lbG6jejoigI/43Ywzi0Zb78ivombfexv0ujXyyed29teulgS6pc:sDukY/+zi0ZbYe1g0ujyzdZc
Behavioral task
behavioral1
Sample
e4d67649c7704c50925bcd3fe6ac345cba54d118407f28f6550b398671b0284e.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e4d67649c7704c50925bcd3fe6ac345cba54d118407f28f6550b398671b0284e.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
blackhatrussia.com clean
51.89.201.41:29254
Targets
-
-
Target
e4d67649c7704c50925bcd3fe6ac345cba54d118407f28f6550b398671b0284e.exe
-
Size
95KB
-
MD5
4622038cc281fbc35d0cfce6c5a595e3
-
SHA1
6f68e253ba656556e0eac9c4dafe6fdadb4c39f9
-
SHA256
e4d67649c7704c50925bcd3fe6ac345cba54d118407f28f6550b398671b0284e
-
SHA512
f5114998a7cfb51a7dec1477b2b3a026fd5a504ac9d4a16bb761ae09fe55074468944a5aaf7c66ed5c67aefdab2b62ca544a3b22ac7d245a0c9ffd11a8c298f3
-
SSDEEP
1536:Oqs+EqJ8lbG6jejoigI/43Ywzi0Zb78ivombfexv0ujXyyed29teulgS6pc:sDukY/+zi0ZbYe1g0ujyzdZc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-