General
-
Target
1308d7d9f135939b43490ded8b2853aa3019dd1488bf101319ffbad13735189c.exe
-
Size
1.7MB
-
Sample
240723-bmabgszbql
-
MD5
759a72c6c8a741df207b79f1736e2b3c
-
SHA1
5e587db482de9557530203b0b6f0eaf14805cab1
-
SHA256
1308d7d9f135939b43490ded8b2853aa3019dd1488bf101319ffbad13735189c
-
SHA512
bdc6e539da23c3bb37ef613a975215b26c3c6e90bea008d4b2c39eaccae0a7929702b27252ca408a0aa1f858682c04745edb789e22afc07a06349cb614a68152
-
SSDEEP
12288:9Yi9sYhmoeoO7gSQu6elbNmD5vjD3FCPePWbU:9YmTcqSQuTSD5nFCWIU
Static task
static1
Behavioral task
behavioral1
Sample
1308d7d9f135939b43490ded8b2853aa3019dd1488bf101319ffbad13735189c.exe
Resource
win7-20240708-en
Malware Config
Extracted
redline
lovato
57.128.132.216:55123
Targets
-
-
Target
1308d7d9f135939b43490ded8b2853aa3019dd1488bf101319ffbad13735189c.exe
-
Size
1.7MB
-
MD5
759a72c6c8a741df207b79f1736e2b3c
-
SHA1
5e587db482de9557530203b0b6f0eaf14805cab1
-
SHA256
1308d7d9f135939b43490ded8b2853aa3019dd1488bf101319ffbad13735189c
-
SHA512
bdc6e539da23c3bb37ef613a975215b26c3c6e90bea008d4b2c39eaccae0a7929702b27252ca408a0aa1f858682c04745edb789e22afc07a06349cb614a68152
-
SSDEEP
12288:9Yi9sYhmoeoO7gSQu6elbNmD5vjD3FCPePWbU:9YmTcqSQuTSD5nFCWIU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-