General
-
Target
C00DE8B488C9399F6104E5E4DA8BB326.exe
-
Size
480KB
-
Sample
231029-wmzllagg4t
-
MD5
c00de8b488c9399f6104e5e4da8bb326
-
SHA1
41738e37f1aa7fe68f305f7c9f8e385c19761dd3
-
SHA256
60543f63bdb95aa5eb03e848218983566c48fac35caa005209214b7ea70e5c09
-
SHA512
669b01097afdf6e575a1267b01a2ba13c32954bd94c764adbeec237416524a36c11c54a1d30c2adf456ab9c7e4f24c2ca254791ee9157e9b3d98e4fe9dce2b16
-
SSDEEP
6144:DGdOl/13jRFYTUn1S5ieek5lB+JfaLt2y0i1p6LtMeG+CVWt40yAE7kwzegKVW2Q:DGdgrYTU1oieb+JfaLx7eAVekze7eQp
Static task
static1
Behavioral task
behavioral1
Sample
C00DE8B488C9399F6104E5E4DA8BB326.exe
Resource
win7-20231023-en
Malware Config
Extracted
redline
cheat
45.137.22.168:55615
Targets
-
-
Target
C00DE8B488C9399F6104E5E4DA8BB326.exe
-
Size
480KB
-
MD5
c00de8b488c9399f6104e5e4da8bb326
-
SHA1
41738e37f1aa7fe68f305f7c9f8e385c19761dd3
-
SHA256
60543f63bdb95aa5eb03e848218983566c48fac35caa005209214b7ea70e5c09
-
SHA512
669b01097afdf6e575a1267b01a2ba13c32954bd94c764adbeec237416524a36c11c54a1d30c2adf456ab9c7e4f24c2ca254791ee9157e9b3d98e4fe9dce2b16
-
SSDEEP
6144:DGdOl/13jRFYTUn1S5ieek5lB+JfaLt2y0i1p6LtMeG+CVWt40yAE7kwzegKVW2Q:DGdgrYTU1oieb+JfaLx7eAVekze7eQp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-