General
-
Target
357b2371c981675051594d5851dc7ca8.exe
-
Size
535KB
-
Sample
240727-fkntbaydnm
-
MD5
357b2371c981675051594d5851dc7ca8
-
SHA1
f2e766123692f906b589e9a63059ec938e6c81f6
-
SHA256
91146fa003f23bd4dae8f201f8941d7adc54474bd3215f6b4d3f9a783abc6805
-
SHA512
f6bb07430716f87a8ed0278b8dfabaa696c16d54e66b874c02809c15777d722f09d19702f27c3cc3c604b85aaac4f78ec42e212ac8ff9171630c2fb33d379603
-
SSDEEP
12288:uY5Q6QcCTSY+aZrwrxvNs+3pneL7wET6sRf9hovCSHvtW:UT/4rHsAO7wO6OjovFg
Static task
static1
Behavioral task
behavioral1
Sample
357b2371c981675051594d5851dc7ca8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
357b2371c981675051594d5851dc7ca8.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
redline
cheat
185.222.58.236:55615
Targets
-
-
Target
357b2371c981675051594d5851dc7ca8.exe
-
Size
535KB
-
MD5
357b2371c981675051594d5851dc7ca8
-
SHA1
f2e766123692f906b589e9a63059ec938e6c81f6
-
SHA256
91146fa003f23bd4dae8f201f8941d7adc54474bd3215f6b4d3f9a783abc6805
-
SHA512
f6bb07430716f87a8ed0278b8dfabaa696c16d54e66b874c02809c15777d722f09d19702f27c3cc3c604b85aaac4f78ec42e212ac8ff9171630c2fb33d379603
-
SSDEEP
12288:uY5Q6QcCTSY+aZrwrxvNs+3pneL7wET6sRf9hovCSHvtW:UT/4rHsAO7wO6OjovFg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-