General
-
Target
c00de8b488c9399f6104e5e4da8bb326.bin
-
Size
440KB
-
Sample
231031-dj6lmaac29
-
MD5
714e09bd3688aafad6e4575d96a5c336
-
SHA1
cdef1de48ac14acc84b88488378efeba0bc00511
-
SHA256
60608719510f648f408a616c69eed12decc189f6a2de8399db8869e5ef635c5e
-
SHA512
17c1aa787c561bf88c91fb2d7be7c60530bf736062e1db7f9618d6cd1156d802610533a2bdd380e5918c411a387eb22bd544838026c9838b0e755cd3b0d6ed6d
-
SSDEEP
12288:5vXsP6eanR1EWbvQMNvxXO1+15Mnr1eyR1gf9RIa:5vsPCMWb5vi+Anr8Og
Static task
static1
Behavioral task
behavioral1
Sample
60543f63bdb95aa5eb03e848218983566c48fac35caa005209214b7ea70e5c09.exe
Resource
win7-20231020-en
Malware Config
Extracted
redline
cheat
45.137.22.168:55615
Targets
-
-
Target
60543f63bdb95aa5eb03e848218983566c48fac35caa005209214b7ea70e5c09.exe
-
Size
480KB
-
MD5
c00de8b488c9399f6104e5e4da8bb326
-
SHA1
41738e37f1aa7fe68f305f7c9f8e385c19761dd3
-
SHA256
60543f63bdb95aa5eb03e848218983566c48fac35caa005209214b7ea70e5c09
-
SHA512
669b01097afdf6e575a1267b01a2ba13c32954bd94c764adbeec237416524a36c11c54a1d30c2adf456ab9c7e4f24c2ca254791ee9157e9b3d98e4fe9dce2b16
-
SSDEEP
6144:DGdOl/13jRFYTUn1S5ieek5lB+JfaLt2y0i1p6LtMeG+CVWt40yAE7kwzegKVW2Q:DGdgrYTU1oieb+JfaLx7eAVekze7eQp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-