General
-
Target
a86d97fe008bfeb8568930bfa03e0057f77b0c8a46048ff011af244bfcefee59.zip
-
Size
1.1MB
-
Sample
240729-zhay8atfmb
-
MD5
435ff08a82c3eacc14a1a46cf1553416
-
SHA1
c049641ee17d4ab8b898ec112f9f99dbe77119a7
-
SHA256
a86d97fe008bfeb8568930bfa03e0057f77b0c8a46048ff011af244bfcefee59
-
SHA512
3e94d9ad3c3766eadc77b104a2db247b118b0ce04fc6b277a8f93150e89eb93c205329724a58c0a55117d699c3eb6277eca97d3d441f06b9fb142e23abdbccab
-
SSDEEP
24576:w+Shb0Ug8XZdz5hrwoXo96VoroJju3wqHq4U3XbY6A3v3rII:Fcb0KVRwm86VorEjTqqF3Xcp
Static task
static1
Behavioral task
behavioral1
Sample
jli.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
redline
lovato
57.128.132.216:55123
Targets
-
-
Target
jli.dll
-
Size
1.8MB
-
MD5
072b9390df5cbe5015fe58da16923659
-
SHA1
bea24458f5b981924f21c16cf8ac77566a821d65
-
SHA256
fd2144a39e567bdf97b54014c6d912289bbd055835190fe377236c3ff8f89290
-
SHA512
e84d607b0f1d039e371c7462f332193e6d0a41bcd3b50810ac162e5375b88d27f9d940d003ee2cfea11b5d66dfb33fc4b74fa50148749a96102b33bac90cca64
-
SSDEEP
24576:3x9Cm6pOSgrbtR/UDI2KNc32ybHAaD835rkbqO1UkTrcwCPIdkgVmdwALoBhkw2:3x9Cm6ASgrbtFUDXTA7gMlPIxYRLgGr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-