General
-
Target
3dfee0f08718b5a1f62cd19d3137b122.exe
-
Size
757KB
-
Sample
240527-k2qrfsfe53
-
MD5
3dfee0f08718b5a1f62cd19d3137b122
-
SHA1
4603546fc6718b8825c86056f7980240bb914a77
-
SHA256
1158215d5b921e90114b5dd8f7bc2abc927444ee824c608e10f7633932bc1afc
-
SHA512
a27f1637d6182560fad0057a629a319a5947735230c3a588b9de13647acf8de7056a87c8fae9ed86a65310b434ce94277c882b02aaf2a9bec464a40be8ecd4e8
-
SSDEEP
12288:a8Tbkm3DwMw3At2l1TqXt0oeyhQPMZrv9bwykR:a8Mn3c2TTtyGO9UB
Static task
static1
Behavioral task
behavioral1
Sample
3dfee0f08718b5a1f62cd19d3137b122.exe
Resource
win7-20240221-en
Malware Config
Extracted
redline
cheat
45.137.22.173:55615
Targets
-
-
Target
3dfee0f08718b5a1f62cd19d3137b122.exe
-
Size
757KB
-
MD5
3dfee0f08718b5a1f62cd19d3137b122
-
SHA1
4603546fc6718b8825c86056f7980240bb914a77
-
SHA256
1158215d5b921e90114b5dd8f7bc2abc927444ee824c608e10f7633932bc1afc
-
SHA512
a27f1637d6182560fad0057a629a319a5947735230c3a588b9de13647acf8de7056a87c8fae9ed86a65310b434ce94277c882b02aaf2a9bec464a40be8ecd4e8
-
SSDEEP
12288:a8Tbkm3DwMw3At2l1TqXt0oeyhQPMZrv9bwykR:a8Mn3c2TTtyGO9UB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-