General
-
Target
a86d97fe008bfeb8568930bfa03e0057f77b0c8a46048ff011af244bfcefee59.zip
-
Size
1.1MB
-
Sample
240726-ng188sycjb
-
MD5
435ff08a82c3eacc14a1a46cf1553416
-
SHA1
c049641ee17d4ab8b898ec112f9f99dbe77119a7
-
SHA256
a86d97fe008bfeb8568930bfa03e0057f77b0c8a46048ff011af244bfcefee59
-
SHA512
3e94d9ad3c3766eadc77b104a2db247b118b0ce04fc6b277a8f93150e89eb93c205329724a58c0a55117d699c3eb6277eca97d3d441f06b9fb142e23abdbccab
-
SSDEEP
24576:w+Shb0Ug8XZdz5hrwoXo96VoroJju3wqHq4U3XbY6A3v3rII:Fcb0KVRwm86VorEjTqqF3Xcp
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-SW M-0013091-DHABI HARDWARE.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
RFQ-SW M-0013091-DHABI HARDWARE.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
redline
lovato
57.128.132.216:55123
Targets
-
-
Target
RFQ-SW M-0013091-DHABI HARDWARE.exe
-
Size
24KB
-
MD5
9f6938e89824ccce04a9272087dec776
-
SHA1
7f19bee228698f4b0bb90b40c6ca2bcadc326a66
-
SHA256
b500874cd5939223c2b7cb52134bef3a3bf6ab1c1d112bf27c6b5e5b15f8177f
-
SHA512
e0052a1bcf5d5ab910da6541c51338e1215a265e8521260bf08ab00ac0320653dafab565ef616d7f1192fb55d4b0feb1666b1a73fcc7b08ae0ac0e625f4b67e1
-
SSDEEP
384:eM4cghl1oqCrKFf4H5A2eFP27xWkVbgWUlIx4cNWcG0FP27NBY3Yuv+ivM:WSqbFQH5iKxnVbgvqxNNZK/Y/+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-