General
-
Target
b77fc538e119d7b94ac123c2fe21b5d403316cbc4510479130f195a18dc61f32.exe
-
Size
797KB
-
Sample
240708-va8hasycpn
-
MD5
114f1c23daae885f851b9cf1fdaf8457
-
SHA1
82338420d02452dfbd4bed8ed753e50739f27484
-
SHA256
b77fc538e119d7b94ac123c2fe21b5d403316cbc4510479130f195a18dc61f32
-
SHA512
262650ad16731df09db9f6f5c816d45e6e2b9bf72a3d8af30ec121d3a1f0fc6e402da3117ecee472af777c7a6e1ac8fa5cd5e7c4ab7517fc7d2d61a9d9659ddb
-
SSDEEP
24576:jqxzXQRlUnZRJOU3MlrQvB5LcFFVo7S+vRSBJIZJi:jq91ZR0U3MlMvHcFFVo7EBAJi
Static task
static1
Behavioral task
behavioral1
Sample
b77fc538e119d7b94ac123c2fe21b5d403316cbc4510479130f195a18dc61f32.exe
Resource
win7-20240704-en
Malware Config
Extracted
redline
cheat
45.137.22.78:55615
Targets
-
-
Target
b77fc538e119d7b94ac123c2fe21b5d403316cbc4510479130f195a18dc61f32.exe
-
Size
797KB
-
MD5
114f1c23daae885f851b9cf1fdaf8457
-
SHA1
82338420d02452dfbd4bed8ed753e50739f27484
-
SHA256
b77fc538e119d7b94ac123c2fe21b5d403316cbc4510479130f195a18dc61f32
-
SHA512
262650ad16731df09db9f6f5c816d45e6e2b9bf72a3d8af30ec121d3a1f0fc6e402da3117ecee472af777c7a6e1ac8fa5cd5e7c4ab7517fc7d2d61a9d9659ddb
-
SSDEEP
24576:jqxzXQRlUnZRJOU3MlrQvB5LcFFVo7S+vRSBJIZJi:jq91ZR0U3MlMvHcFFVo7EBAJi
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-