General
-
Target
7350177a6ad69becc15c250ae9f9e8ae9222f8499ebda3f5ee6e069ef6e3bc54
-
Size
708KB
-
Sample
240309-aafgasab89
-
MD5
014feeea3acc5dc8846f4c358be6dbf2
-
SHA1
4a1aa3cd3c85bfc59c8d7671a78d5f67a19948a6
-
SHA256
7350177a6ad69becc15c250ae9f9e8ae9222f8499ebda3f5ee6e069ef6e3bc54
-
SHA512
0b8c67fb31f25fb06f4942c40920dba4771617f911ba13fcacebd1ee952f39c821cf9e4ba8aa80da578688d5f98ac0111a1999659f17450d233b9feba0cb67eb
-
SSDEEP
12288:K6ErxJMTtEultk8Mn/fRRCY85nKbQI0St1EvFsIyMzrC15bavKV/CQy1QoswZLJZ:KJr8tE+28yRRKnKsQtGdsPMzrs5+vKV2
Static task
static1
Behavioral task
behavioral1
Sample
7350177a6ad69becc15c250ae9f9e8ae9222f8499ebda3f5ee6e069ef6e3bc54.exe
Resource
win7-20240221-en
Malware Config
Extracted
redline
cheat
45.137.22.229:55615
Targets
-
-
Target
7350177a6ad69becc15c250ae9f9e8ae9222f8499ebda3f5ee6e069ef6e3bc54
-
Size
708KB
-
MD5
014feeea3acc5dc8846f4c358be6dbf2
-
SHA1
4a1aa3cd3c85bfc59c8d7671a78d5f67a19948a6
-
SHA256
7350177a6ad69becc15c250ae9f9e8ae9222f8499ebda3f5ee6e069ef6e3bc54
-
SHA512
0b8c67fb31f25fb06f4942c40920dba4771617f911ba13fcacebd1ee952f39c821cf9e4ba8aa80da578688d5f98ac0111a1999659f17450d233b9feba0cb67eb
-
SSDEEP
12288:K6ErxJMTtEultk8Mn/fRRCY85nKbQI0St1EvFsIyMzrC15bavKV/CQy1QoswZLJZ:KJr8tE+28yRRKnKsQtGdsPMzrs5+vKV2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-