General
-
Target
3fc9c1a56f30cf18e75f458ba4470cee
-
Size
471KB
-
Sample
240104-d34alsgafm
-
MD5
3fc9c1a56f30cf18e75f458ba4470cee
-
SHA1
4f79fa2f37e7c795a25b753df8c53b6d4cc46d28
-
SHA256
a455ea749bf2aa78f43ca6beb1fec983ca39b71e23ab8a951c6b3c0a23ae6b7c
-
SHA512
b3149d9a303c0260e0b1452d20c196bb94d8c7f3a44d6a4ed9870b015e61b33b45eada50646fc2c40784a15c0349dbd1475ac69a38160cb085a0a9c3aa0bc807
-
SSDEEP
6144:xYa0TXGrWVqIUgpXSRER+JTKasRLwnSmU2h0:xsX6KqpMXSER+JTHsRLwnSmUv
Static task
static1
Behavioral task
behavioral1
Sample
3fc9c1a56f30cf18e75f458ba4470cee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3fc9c1a56f30cf18e75f458ba4470cee.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
redline
Lamborghini
45.88.3.176:17033
Targets
-
-
Target
3fc9c1a56f30cf18e75f458ba4470cee
-
Size
471KB
-
MD5
3fc9c1a56f30cf18e75f458ba4470cee
-
SHA1
4f79fa2f37e7c795a25b753df8c53b6d4cc46d28
-
SHA256
a455ea749bf2aa78f43ca6beb1fec983ca39b71e23ab8a951c6b3c0a23ae6b7c
-
SHA512
b3149d9a303c0260e0b1452d20c196bb94d8c7f3a44d6a4ed9870b015e61b33b45eada50646fc2c40784a15c0349dbd1475ac69a38160cb085a0a9c3aa0bc807
-
SSDEEP
6144:xYa0TXGrWVqIUgpXSRER+JTKasRLwnSmU2h0:xsX6KqpMXSER+JTHsRLwnSmUv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Turns off Windows Defender SpyNet reporting
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-