General
-
Target
76a8dd96ad6d6a1f4c1e58fa5781b5ea.bin
-
Size
674KB
-
Sample
240729-dhjqgazdlp
-
MD5
7534baadfb64576e428bf99e65269c29
-
SHA1
51d13be71f2eed3df5ab8dbdfdb219eb449fb7b4
-
SHA256
4be9c5f06ab3ea43ecd5ba23cf8be5e2c7187161092d9605c80c191a5744acc6
-
SHA512
6d31cf8d16d89411ffd99343776a555eafe3420d9eef1f7fc16ab3d022673a286bc11851829313690f02692db3195d7f416d7af13bd367b8dbdaa07906e9719c
-
SSDEEP
12288:amEJeLVA3CPNmgvPEv3WmH1Wr+PRJoZ1o88m85/VqM4EsZF4B:U2m3CP0sM1VE+y1ojmqwEgmB
Static task
static1
Behavioral task
behavioral1
Sample
de1565a5b502c4e2ddf7dbeed2cc4ef685adb6f0731c386943ee6daee4c4fd85.exe
Resource
win7-20240704-en
Malware Config
Extracted
redline
cheat
185.222.57.151:55615
Targets
-
-
Target
de1565a5b502c4e2ddf7dbeed2cc4ef685adb6f0731c386943ee6daee4c4fd85.exe
-
Size
795KB
-
MD5
76a8dd96ad6d6a1f4c1e58fa5781b5ea
-
SHA1
320a0c397b4165ea4ff449a1cab48a246022c103
-
SHA256
de1565a5b502c4e2ddf7dbeed2cc4ef685adb6f0731c386943ee6daee4c4fd85
-
SHA512
16ec6c93ecf63cfa50ed155ef3b1ccd67b26f76f7884a15648d47745fc495a8dee7e79522d0a051724e36b5dfa879a9c1d9d6bd00f5792cb960a7a2d3879678d
-
SSDEEP
12288:5X4riL9sU/BYuCQHip+hDa/fRRCcDt19QGHPgBWw/FPOl9H8s41UgHsOBAKRg3l:5XB5vC2ipMDGRRbggwNG9C1UgHs2pkl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-