General
-
Target
Redeye Email Checker.exe
-
Size
1.8MB
-
Sample
240805-w665savarp
-
MD5
ee91506ae8f5516e3db1a0931ea8843c
-
SHA1
6862064d8a664626fd6d39e4d4c57d6c68ac245d
-
SHA256
8b904606790976539fd73805d8a8283a30b67907bc35f7e98e3f679d500d0aca
-
SHA512
d8bd0818dcdcf3904fb93af282c27f25607d980a5de18a4ff4081ecab43eee42408ba381e33531bdc5c261875b4076c214244c34d765cb0cd3f3351542cc1ae9
-
SSDEEP
24576:SR+kTF4nMlM6O7PxpXkEX7L1Mfyx4AdGIBDA2d7/cqPfRtItNaFIJ0AwJyxWgZqe:++uKnzZVkS10AdGI9lvRt8PxWYskAD
Static task
static1
Behavioral task
behavioral1
Sample
Redeye Email Checker.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Redeye Email Checker.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
UltimateCrackPack
51.83.170.23:16128
Targets
-
-
Target
Redeye Email Checker.exe
-
Size
1.8MB
-
MD5
ee91506ae8f5516e3db1a0931ea8843c
-
SHA1
6862064d8a664626fd6d39e4d4c57d6c68ac245d
-
SHA256
8b904606790976539fd73805d8a8283a30b67907bc35f7e98e3f679d500d0aca
-
SHA512
d8bd0818dcdcf3904fb93af282c27f25607d980a5de18a4ff4081ecab43eee42408ba381e33531bdc5c261875b4076c214244c34d765cb0cd3f3351542cc1ae9
-
SSDEEP
24576:SR+kTF4nMlM6O7PxpXkEX7L1Mfyx4AdGIBDA2d7/cqPfRtItNaFIJ0AwJyxWgZqe:++uKnzZVkS10AdGI9lvRt8PxWYskAD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-