General
-
Target
CATALOGUE.zip
-
Size
459KB
-
Sample
240712-peccrsvfkg
-
MD5
1b9b749f71b01ebcd43c873b8ced0750
-
SHA1
c1d4ab0ac1224ffd96bddd089370fcd1a6dc8dba
-
SHA256
cd4aa5fa47501d5af7bdd51bd6547975c7319f7de6f1210503dc8ded5c4d5416
-
SHA512
8232d383cb28f3e49ad5edd8deefafc2b991c5d47ac040151ed10a76dbc696b7e68590e892e375c832f08aa30a9ed8347d9da5023c29e9116fae72a7ae88c2d8
-
SSDEEP
12288:ptVhRah55F/p+gbfRv4IsoLaUIx23xsarh:pbM5F/nrRvj5Ix232arh
Static task
static1
Behavioral task
behavioral1
Sample
CATALOGUE.exe
Resource
win7-20240708-en
Malware Config
Extracted
redline
biss
172.81.131.198:16383
Targets
-
-
Target
CATALOGUE.exe
-
Size
2.7MB
-
MD5
a3a55457b08e66b8246b3ab4f5afc5f8
-
SHA1
bcfbda193b0091361b4a9ddb06717e219a389351
-
SHA256
2c7c1638330a59ae2a7c7b549384b6cc6b915584c4c99c59256fdea1930437d7
-
SHA512
b61f2d8f84ee90fd08e057cbdb52df0881998b108f1affa156e0250458cef70007a954ae7913129883f46dcb29e5e697e17cbecef835e6c2378cca080a8d7743
-
SSDEEP
12288:mJZ7RmT35hppmYbhFD4IssrqUIb231sarW:mZA5hpZFFDtpIb23CarW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-