General
-
Target
24b1454141362b9675b17e9d779c5c93.bin
-
Size
43KB
-
Sample
250108-bgwyasxlas
-
MD5
c0d477ba33ebb2d04b74f04b35b1fe08
-
SHA1
9b8def10b8d1ea9cf4ec6b51cc364827bebef114
-
SHA256
31bded119969fb6cb9614819db05d756bbf53c6c9afa5d5ca6d4f6ec1214321e
-
SHA512
c9deb03059b6134b74843a583309981fed3fcf74fcff9ae579e765a1b93346a6adc083543e814e5492d95b1b676d9b02e691454d25ef1154c46acaaccfe9cd50
-
SSDEEP
768:uhdYgPi3SvjSjBwP8fUfKsUcrfnLMOW2SqwsX2g0V9WCzfztPfd91p0akoXlDkE6:uhdYJva82UczngOWvqwC8jzfztPVJPfW
Behavioral task
behavioral1
Sample
a94af8234c234fb5e65dedcfb33823abfbbefd0f451bbbddd96b6fc455e4cfa1.exe
Resource
win7-20240729-en
Malware Config
Extracted
redline
@Pr0xyBro
77.90.22.45:15352
Targets
-
-
Target
a94af8234c234fb5e65dedcfb33823abfbbefd0f451bbbddd96b6fc455e4cfa1.exe
-
Size
95KB
-
MD5
24b1454141362b9675b17e9d779c5c93
-
SHA1
485b0ecf657a25dc28913e29bcfb91f47055af81
-
SHA256
a94af8234c234fb5e65dedcfb33823abfbbefd0f451bbbddd96b6fc455e4cfa1
-
SHA512
bc63bd7fa3b2183982a34411a14770235fb1eb7659a303fe508a8fe20b7642d9050f7f6323db229d16756d70e2d12dd9cd1fcfdfa6e76ff954766f14e43ef756
-
SSDEEP
1536:5qskOqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2xteulgS6p8l:XPuOYj+zi0ZbYe1g0ujyzdV8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-