General
-
Target
8a599ff1cee0f25d36332cc64f722673.exe
-
Size
483KB
-
Sample
230807-rmtywsgh71
-
MD5
8a599ff1cee0f25d36332cc64f722673
-
SHA1
242f2816c83cf26d49abc40079ba3458b1d58b2f
-
SHA256
ad6672b5390661b265f162f695ce7e75d0f8a11bbc9847d04893155219c9c2b5
-
SHA512
53a9a33a6889b3fa1c193f6bc9ec6606b6c780ef7f0c0749e64a15f744c9eca5d67531695b76a5508d8c1c49ce4098d414e90f58bb619447dc8ab4be5ab8ebd0
-
SSDEEP
12288:sW3RmeuWCLraizRk5KnNOKNAPhCmjN/WN9i7cBapTkxyKW:ZoeuWCXd1zNORQO5WN4iWkxrW
Static task
static1
Behavioral task
behavioral1
Sample
8a599ff1cee0f25d36332cc64f722673.exe
Resource
win7-20230712-en
Malware Config
Extracted
redline
trial
173.44.141.116:38411
Targets
-
-
Target
8a599ff1cee0f25d36332cc64f722673.exe
-
Size
483KB
-
MD5
8a599ff1cee0f25d36332cc64f722673
-
SHA1
242f2816c83cf26d49abc40079ba3458b1d58b2f
-
SHA256
ad6672b5390661b265f162f695ce7e75d0f8a11bbc9847d04893155219c9c2b5
-
SHA512
53a9a33a6889b3fa1c193f6bc9ec6606b6c780ef7f0c0749e64a15f744c9eca5d67531695b76a5508d8c1c49ce4098d414e90f58bb619447dc8ab4be5ab8ebd0
-
SSDEEP
12288:sW3RmeuWCLraizRk5KnNOKNAPhCmjN/WN9i7cBapTkxyKW:ZoeuWCXd1zNORQO5WN4iWkxrW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Drops startup file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-