General
-
Target
89dd158d0ffdb6d661672343d36f5a87907e1cc60a0e9e85c892f75228eb399b.exe
-
Size
550KB
-
Sample
240728-bs68eazenm
-
MD5
304ea6d5cf3786d19de14f004d7d057a
-
SHA1
d86ddb3becc0a82c915be35e7a7dcd796b50c269
-
SHA256
89dd158d0ffdb6d661672343d36f5a87907e1cc60a0e9e85c892f75228eb399b
-
SHA512
4c0731a52e57e429d1001da518066c073ceb0c9c91992e66dc674c3dfc352156e48dc22dc5482310d2c0ce38a2e87aace2dcfa7a9e6915d1bde3eee7bc8d3c08
-
SSDEEP
12288:1Y5Q6QFm4SY+aZrwrLVRqRNlom98NGykPI7MqXb39bNjgJaXukR:u4/4rLVRqhoKIGNIgqxRiO1
Static task
static1
Behavioral task
behavioral1
Sample
89dd158d0ffdb6d661672343d36f5a87907e1cc60a0e9e85c892f75228eb399b.exe
Resource
win7-20240708-en
Malware Config
Extracted
redline
cheat
185.222.57.151:55615
Targets
-
-
Target
89dd158d0ffdb6d661672343d36f5a87907e1cc60a0e9e85c892f75228eb399b.exe
-
Size
550KB
-
MD5
304ea6d5cf3786d19de14f004d7d057a
-
SHA1
d86ddb3becc0a82c915be35e7a7dcd796b50c269
-
SHA256
89dd158d0ffdb6d661672343d36f5a87907e1cc60a0e9e85c892f75228eb399b
-
SHA512
4c0731a52e57e429d1001da518066c073ceb0c9c91992e66dc674c3dfc352156e48dc22dc5482310d2c0ce38a2e87aace2dcfa7a9e6915d1bde3eee7bc8d3c08
-
SSDEEP
12288:1Y5Q6QFm4SY+aZrwrLVRqRNlom98NGykPI7MqXb39bNjgJaXukR:u4/4rLVRqhoKIGNIgqxRiO1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-