General
-
Target
E87AD5F7041EFF087B6BFF15CF1DAB3A.exe
-
Size
657KB
-
Sample
240717-gqwlsaybqm
-
MD5
e87ad5f7041eff087b6bff15cf1dab3a
-
SHA1
9a22fb7c1769a517b4b72e4310ff7c9f399f0f32
-
SHA256
a03e5ea28a045edffc05c69ec5d06601425b60ec2523448bd46e14ff17643c95
-
SHA512
b6477f6e27aefd2851b5827ef202e7b918e5085afaa21ad9fdbde3d3aeae87cd4e1020ce207e1b276ed472c77f30063abde39f24e71c657bbfe9bf6191b5a815
-
SSDEEP
12288:J7PcxgeYL893+uJ6C+Qs8ffuc2BgFEM0XZJEmJ2rIO:JbcYgBqSfuc2Bgn0smJUN
Static task
static1
Behavioral task
behavioral1
Sample
E87AD5F7041EFF087B6BFF15CF1DAB3A.exe
Resource
win7-20240704-en
Malware Config
Extracted
redline
cheat
185.222.57.147:55615
Targets
-
-
Target
E87AD5F7041EFF087B6BFF15CF1DAB3A.exe
-
Size
657KB
-
MD5
e87ad5f7041eff087b6bff15cf1dab3a
-
SHA1
9a22fb7c1769a517b4b72e4310ff7c9f399f0f32
-
SHA256
a03e5ea28a045edffc05c69ec5d06601425b60ec2523448bd46e14ff17643c95
-
SHA512
b6477f6e27aefd2851b5827ef202e7b918e5085afaa21ad9fdbde3d3aeae87cd4e1020ce207e1b276ed472c77f30063abde39f24e71c657bbfe9bf6191b5a815
-
SSDEEP
12288:J7PcxgeYL893+uJ6C+Qs8ffuc2BgFEM0XZJEmJ2rIO:JbcYgBqSfuc2Bgn0smJUN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-