General
-
Target
094c83270e926b418dd431978ae802d8.exe
-
Size
95KB
-
Sample
250213-npnm4sxqcw
-
MD5
094c83270e926b418dd431978ae802d8
-
SHA1
0ddbf017e6313f004f0c7b66ee7e2706564f16e1
-
SHA256
4e2af86db2326d23ede094f504645213dd0f26f0e86b5059b6cf9bd5a8115dea
-
SHA512
9d7dd275de9b57fd27ae5d8ebcc9a7d4842ed0c0bc8e16e9d1a16b0f7429fec562d771feca9c36c9b27c54127215c00cea772eb3248e7059351f6baa1c0a61c7
-
SSDEEP
1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed203tmulgS6pY:r0gzWHY3+zi0ZbYe1g0ujyzdmY
Behavioral task
behavioral1
Sample
094c83270e926b418dd431978ae802d8.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
91.92.136.87:26264
Targets
-
-
Target
094c83270e926b418dd431978ae802d8.exe
-
Size
95KB
-
MD5
094c83270e926b418dd431978ae802d8
-
SHA1
0ddbf017e6313f004f0c7b66ee7e2706564f16e1
-
SHA256
4e2af86db2326d23ede094f504645213dd0f26f0e86b5059b6cf9bd5a8115dea
-
SHA512
9d7dd275de9b57fd27ae5d8ebcc9a7d4842ed0c0bc8e16e9d1a16b0f7429fec562d771feca9c36c9b27c54127215c00cea772eb3248e7059351f6baa1c0a61c7
-
SSDEEP
1536:9qs+XqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed203tmulgS6pY:r0gzWHY3+zi0ZbYe1g0ujyzdmY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2