General
-
Target
3599fa63d78413242a88966d3b4b14ef.bin
-
Size
566KB
-
Sample
240705-bzmgksyhpr
-
MD5
0d00a43802d22c44e4c15f653c06c8ec
-
SHA1
411ee21850cd2fcb77c1cc2c9424f2f5a07ead2d
-
SHA256
d6291f04688e967d0b4eb08effefcf3de896b2511684b5f57dd7bdb6a2921404
-
SHA512
6cef0d7bfb278eb1d277e70208acf5bd37d0d05b56e7edf09125804417e627affcff3e253e9aca57c55c8d861253ac07c2b99be691fb476749ef27ea89bb7f90
-
SSDEEP
12288:3sGNmEHvMH9HACguGdZbkOV/mVSsI12S53mOWeMWY:L8EP6gC7GdZJ6I1H2JeMWY
Static task
static1
Behavioral task
behavioral1
Sample
c08ff513ad0787ed08c72bbdcda0d166e603ea0736f5687b3dddc0f4bb87da33.exe
Resource
win7-20240704-en
Malware Config
Extracted
redline
cheat
185.222.58.91:55615
Targets
-
-
Target
c08ff513ad0787ed08c72bbdcda0d166e603ea0736f5687b3dddc0f4bb87da33.exe
-
Size
713KB
-
MD5
3599fa63d78413242a88966d3b4b14ef
-
SHA1
44526b00e847d9a16908c79f72dab1af4a2edf29
-
SHA256
c08ff513ad0787ed08c72bbdcda0d166e603ea0736f5687b3dddc0f4bb87da33
-
SHA512
e04604e58c9a0eb4e6bbea99d59295463cb9058f82c2527502acb6fe47989fc4f72b69338bb66ca5c5fc5a62d785fb65fcd4eb272a6136a1c240592076845d73
-
SSDEEP
12288:vV9E8GILjWLWg/yvjaRBv5MIorus1IPI4AMqoYg/6vXdW1JeSel43qiukR:7cam5MI+TIPuM//CXd+JWl46i1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-