General
-
Target
2585cb569fb0b17313e1181b721645f7b56114a527c94dac60e3fd15c7411370.exe
-
Size
1.9MB
-
Sample
240720-ky8g4avflp
-
MD5
5a8bb97eda38a7db42e669fe8f34a067
-
SHA1
732b563df5827ce251b5752d20e1454edaae3702
-
SHA256
2585cb569fb0b17313e1181b721645f7b56114a527c94dac60e3fd15c7411370
-
SHA512
c3fbc7e0a51733ccc087281aef884736b3d65c7c4eee241739a7bce8f97ae14f928fd3db27121b271187336ef24053b0239f0688e2440abcb595976fd791491e
-
SSDEEP
49152:52u/BMdg532rpsjCMqigjns2+a95PlpiH9MzMrcgt4h6NdiBB:2rpEZITBB
Static task
static1
Behavioral task
behavioral1
Sample
2585cb569fb0b17313e1181b721645f7b56114a527c94dac60e3fd15c7411370.exe
Resource
win7-20240708-en
Malware Config
Extracted
redline
lovato
57.128.132.216:55123
Targets
-
-
Target
2585cb569fb0b17313e1181b721645f7b56114a527c94dac60e3fd15c7411370.exe
-
Size
1.9MB
-
MD5
5a8bb97eda38a7db42e669fe8f34a067
-
SHA1
732b563df5827ce251b5752d20e1454edaae3702
-
SHA256
2585cb569fb0b17313e1181b721645f7b56114a527c94dac60e3fd15c7411370
-
SHA512
c3fbc7e0a51733ccc087281aef884736b3d65c7c4eee241739a7bce8f97ae14f928fd3db27121b271187336ef24053b0239f0688e2440abcb595976fd791491e
-
SSDEEP
49152:52u/BMdg532rpsjCMqigjns2+a95PlpiH9MzMrcgt4h6NdiBB:2rpEZITBB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-