General
-
Target
cfd967c789c68c41807d2d1424a7b3ba67d94834189750dc7b28da7513c4d0a5
-
Size
512KB
-
Sample
240805-dv1jrazarb
-
MD5
438a600526521cbaf9727a2c6bf41eba
-
SHA1
53b045ebc10a272380b0b48f8f7a3a96d2afd0b9
-
SHA256
cfd967c789c68c41807d2d1424a7b3ba67d94834189750dc7b28da7513c4d0a5
-
SHA512
118f2fe8636cf003c4eda3c3662d97bef1807d257d4d96f7ce167f350689f73d4651e9d5571da655bc2768ed0c4d1677eab183e5dcab935fe856208f0451ba49
-
SSDEEP
12288:BDf4QK88rOmq8aEcW/3z4DZInH0P7x+DoJ:BcQKNOtPvD7F+C
Static task
static1
Behavioral task
behavioral1
Sample
cfd967c789c68c41807d2d1424a7b3ba67d94834189750dc7b28da7513c4d0a5.exe
Resource
win7-20240708-en
Malware Config
Extracted
redline
cheat
billred229102.duckdns.org:26546
Targets
-
-
Target
cfd967c789c68c41807d2d1424a7b3ba67d94834189750dc7b28da7513c4d0a5
-
Size
512KB
-
MD5
438a600526521cbaf9727a2c6bf41eba
-
SHA1
53b045ebc10a272380b0b48f8f7a3a96d2afd0b9
-
SHA256
cfd967c789c68c41807d2d1424a7b3ba67d94834189750dc7b28da7513c4d0a5
-
SHA512
118f2fe8636cf003c4eda3c3662d97bef1807d257d4d96f7ce167f350689f73d4651e9d5571da655bc2768ed0c4d1677eab183e5dcab935fe856208f0451ba49
-
SSDEEP
12288:BDf4QK88rOmq8aEcW/3z4DZInH0P7x+DoJ:BcQKNOtPvD7F+C
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-