General
-
Target
3a82f0b63ef6186c5f10a47d41726d894b21032a3e35dd84bc3be8729d2b9a09.exe
-
Size
535KB
-
Sample
240809-bj8d4sxflg
-
MD5
31097d0ff3fa776d176018a8fa2299fa
-
SHA1
45a224a3ae0cffb8f49af66882921e7c1718b795
-
SHA256
3a82f0b63ef6186c5f10a47d41726d894b21032a3e35dd84bc3be8729d2b9a09
-
SHA512
b3bee5a850e981cdf688fc4d1fd7cbaf66887f17f1a45b13c11d81c59d6ebf328ef3dc3610fcf28302956a876b62d86d4ba709a40addec8785b6fc352c386e8f
-
SSDEEP
12288:w8bY22oVVenRF7lewJxzdiJDoo6TV4mv:w2Y2RVVenRb5dEch
Static task
static1
Behavioral task
behavioral1
Sample
3a82f0b63ef6186c5f10a47d41726d894b21032a3e35dd84bc3be8729d2b9a09.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a82f0b63ef6186c5f10a47d41726d894b21032a3e35dd84bc3be8729d2b9a09.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
cheat
45.137.22.108:55615
Targets
-
-
Target
3a82f0b63ef6186c5f10a47d41726d894b21032a3e35dd84bc3be8729d2b9a09.exe
-
Size
535KB
-
MD5
31097d0ff3fa776d176018a8fa2299fa
-
SHA1
45a224a3ae0cffb8f49af66882921e7c1718b795
-
SHA256
3a82f0b63ef6186c5f10a47d41726d894b21032a3e35dd84bc3be8729d2b9a09
-
SHA512
b3bee5a850e981cdf688fc4d1fd7cbaf66887f17f1a45b13c11d81c59d6ebf328ef3dc3610fcf28302956a876b62d86d4ba709a40addec8785b6fc352c386e8f
-
SSDEEP
12288:w8bY22oVVenRF7lewJxzdiJDoo6TV4mv:w2Y2RVVenRb5dEch
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-