General
-
Target
390FC6C7C2B8F8D411F425A8E4CCAC38.exe
-
Size
95KB
-
Sample
250201-wyvrsawpcj
-
MD5
390fc6c7c2b8f8d411f425a8e4ccac38
-
SHA1
a61674f6ef386be9c89d42dc8c7fd50a2f775fb2
-
SHA256
f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3
-
SHA512
0c4fff1b0ebbedc63df667740151f5fee3dc0a5025cf9681f2915fc3667cfaa473cbd5ecbd4515dc9c28b8c2f8915c2e3cc0776031ee7e1ce58b64389854dc04
-
SSDEEP
1536:FqsIhaqpalbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2otmulgS6pQl:DGaKaYP+zi0ZbYe1g0ujyzdMQ
Behavioral task
behavioral1
Sample
390FC6C7C2B8F8D411F425A8E4CCAC38.exe
Resource
win7-20240708-en
Malware Config
Extracted
redline
20250129
103.84.89.222:33791
Targets
-
-
Target
390FC6C7C2B8F8D411F425A8E4CCAC38.exe
-
Size
95KB
-
MD5
390fc6c7c2b8f8d411f425a8e4ccac38
-
SHA1
a61674f6ef386be9c89d42dc8c7fd50a2f775fb2
-
SHA256
f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3
-
SHA512
0c4fff1b0ebbedc63df667740151f5fee3dc0a5025cf9681f2915fc3667cfaa473cbd5ecbd4515dc9c28b8c2f8915c2e3cc0776031ee7e1ce58b64389854dc04
-
SSDEEP
1536:FqsIhaqpalbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2otmulgS6pQl:DGaKaYP+zi0ZbYe1g0ujyzdMQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-