General
-
Target
3abd9925a66cbc91c5bb9b261fe18db081581fd898b1197122c20aabf055474a
-
Size
558KB
-
Sample
240625-14d4fawgqg
-
MD5
a56b296b440dd37fdc820a79373ab0d9
-
SHA1
cc555a9ece05af0a60ebb89e5c392c6dbbedac4a
-
SHA256
3abd9925a66cbc91c5bb9b261fe18db081581fd898b1197122c20aabf055474a
-
SHA512
a3a6ef1824d75eacd0342a6d21b0f80bb247ccbbedebdba5e26d1cb04e5ef41be85f758957a5f704cae160e946c2757e0531b1466b0409ccc2c09bd5c2b53186
-
SSDEEP
12288:cvVX9Koe0T8l++GpoTp2AnNtYyTlOr3++yDuzK4Y/3vw:at7e0T8l+xpoTp2ANtzlOr3+B+4/3
Static task
static1
Behavioral task
behavioral1
Sample
3abd9925a66cbc91c5bb9b261fe18db081581fd898b1197122c20aabf055474a.exe
Resource
win7-20240508-en
Malware Config
Extracted
redline
cheat
45.137.22.71:55615
Targets
-
-
Target
3abd9925a66cbc91c5bb9b261fe18db081581fd898b1197122c20aabf055474a
-
Size
558KB
-
MD5
a56b296b440dd37fdc820a79373ab0d9
-
SHA1
cc555a9ece05af0a60ebb89e5c392c6dbbedac4a
-
SHA256
3abd9925a66cbc91c5bb9b261fe18db081581fd898b1197122c20aabf055474a
-
SHA512
a3a6ef1824d75eacd0342a6d21b0f80bb247ccbbedebdba5e26d1cb04e5ef41be85f758957a5f704cae160e946c2757e0531b1466b0409ccc2c09bd5c2b53186
-
SSDEEP
12288:cvVX9Koe0T8l++GpoTp2AnNtYyTlOr3++yDuzK4Y/3vw:at7e0T8l+xpoTp2ANtzlOr3+B+4/3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-