General
-
Target
30d31c8a72f67e34bbedc3d6fade478b913943dc7467c56dc81938272eef79a5
-
Size
1.4MB
-
Sample
240806-qngvaazgll
-
MD5
d70eb78f0c8b90a0ece87c353a2ebb5e
-
SHA1
cb328eaf56214d5335dac833e4c89c29de2d372f
-
SHA256
30d31c8a72f67e34bbedc3d6fade478b913943dc7467c56dc81938272eef79a5
-
SHA512
6f5be3370487fdeb189f56fc610c88a749dbe00ebe5a19dcdae21eb5648e0da86316b174fed7914eb5841baf03d19419238a6c4fa0203775beea94d4904eb1de
-
SSDEEP
24576:gxcJspxHAYT3XVJlT7cpqOynkxZkW8tIkyrJv24/Yh3NW0zFdlR8rqW2xhSJ8R:g+azT3PlT7WdsTJOqtUiR
Static task
static1
Behavioral task
behavioral1
Sample
30d31c8a72f67e34bbedc3d6fade478b913943dc7467c56dc81938272eef79a5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
30d31c8a72f67e34bbedc3d6fade478b913943dc7467c56dc81938272eef79a5.exe
Resource
win11-20240802-en
Malware Config
Extracted
redline
server.underground-cheat.xyz
server.underground-cheat.xyz:1337
Targets
-
-
Target
30d31c8a72f67e34bbedc3d6fade478b913943dc7467c56dc81938272eef79a5
-
Size
1.4MB
-
MD5
d70eb78f0c8b90a0ece87c353a2ebb5e
-
SHA1
cb328eaf56214d5335dac833e4c89c29de2d372f
-
SHA256
30d31c8a72f67e34bbedc3d6fade478b913943dc7467c56dc81938272eef79a5
-
SHA512
6f5be3370487fdeb189f56fc610c88a749dbe00ebe5a19dcdae21eb5648e0da86316b174fed7914eb5841baf03d19419238a6c4fa0203775beea94d4904eb1de
-
SSDEEP
24576:gxcJspxHAYT3XVJlT7cpqOynkxZkW8tIkyrJv24/Yh3NW0zFdlR8rqW2xhSJ8R:g+azT3PlT7WdsTJOqtUiR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-