General
-
Target
EA2A51D3675852C7ABA80FB4AEFD6D19.exe
-
Size
95KB
-
Sample
250110-g66rpavnet
-
MD5
ea2a51d3675852c7aba80fb4aefd6d19
-
SHA1
72307adf53b1b8a28dd5d4094ef98df8cc28b743
-
SHA256
105bff0cd42f9453a8c41953d2eac1faa39d0f1c0446fe44e36c75307e8d1c0a
-
SHA512
aba59de2a9a6fcd2b836f53777dc908900ae1ad5f3f4815d30704d3ec770240a79e72330b0a2a6631c17dea6363ff4e3e1cfc88f0f55de23ef27808b5446d984
-
SSDEEP
1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2z3tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzdT8
Behavioral task
behavioral1
Sample
EA2A51D3675852C7ABA80FB4AEFD6D19.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
185.222.58.237:55615
Targets
-
-
Target
EA2A51D3675852C7ABA80FB4AEFD6D19.exe
-
Size
95KB
-
MD5
ea2a51d3675852c7aba80fb4aefd6d19
-
SHA1
72307adf53b1b8a28dd5d4094ef98df8cc28b743
-
SHA256
105bff0cd42f9453a8c41953d2eac1faa39d0f1c0446fe44e36c75307e8d1c0a
-
SHA512
aba59de2a9a6fcd2b836f53777dc908900ae1ad5f3f4815d30704d3ec770240a79e72330b0a2a6631c17dea6363ff4e3e1cfc88f0f55de23ef27808b5446d984
-
SSDEEP
1536:5qsCbqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2z3tmulgS6p8l:XEwiYj+zi0ZbYe1g0ujyzdT8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-