General
-
Target
788006d305b062dfa22b0acf645493fb6ff8c97955d2cd53c89d0df8383dcf86.exe
-
Size
537KB
-
Sample
240731-bw8kmstfjf
-
MD5
9954659fe9b70868e651001b52d17691
-
SHA1
f2035cf1739bd6da81328cdf964f739fa9090110
-
SHA256
788006d305b062dfa22b0acf645493fb6ff8c97955d2cd53c89d0df8383dcf86
-
SHA512
1ac3216f2c3ff24186f565cef6af8816bcba1d96a2ffa9dc242390852db50fdc0411675618ed1d9ef17054fdab122cc6a91e9857805464d540e93ee83d8746ca
-
SSDEEP
12288:HuASY+aZrwrZaOTUTpfS9PyzipZlYsbxI9WZw2i:h/4rEOWulpZlHbcWZG
Static task
static1
Behavioral task
behavioral1
Sample
788006d305b062dfa22b0acf645493fb6ff8c97955d2cd53c89d0df8383dcf86.exe
Resource
win7-20240708-en
Malware Config
Extracted
redline
eff123
143.244.169.95:16383
Targets
-
-
Target
788006d305b062dfa22b0acf645493fb6ff8c97955d2cd53c89d0df8383dcf86.exe
-
Size
537KB
-
MD5
9954659fe9b70868e651001b52d17691
-
SHA1
f2035cf1739bd6da81328cdf964f739fa9090110
-
SHA256
788006d305b062dfa22b0acf645493fb6ff8c97955d2cd53c89d0df8383dcf86
-
SHA512
1ac3216f2c3ff24186f565cef6af8816bcba1d96a2ffa9dc242390852db50fdc0411675618ed1d9ef17054fdab122cc6a91e9857805464d540e93ee83d8746ca
-
SSDEEP
12288:HuASY+aZrwrZaOTUTpfS9PyzipZlYsbxI9WZw2i:h/4rEOWulpZlHbcWZG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-