General
-
Target
01d452e81b85a3d399a247852f2f5004.bin
-
Size
614KB
-
Sample
241015-bcpcnavhlh
-
MD5
ded4f5cc4ea43f237a6d922660f96715
-
SHA1
40a3896818f3343b560b33df08964170837ec2e4
-
SHA256
d3c126878bd5c77e080c3c30780234f7ce85547826f8a5a7d46f509d34ad09dc
-
SHA512
538a050451a4f586edd34e95f0787d9421fcb944f7edd38885e6bd403e23f36d2c19c2d691c4c639d2b51c0896101d6147077db9dc7b9c43a822e61072f123f0
-
SSDEEP
12288:LJk7Z/BGAXSh/m7FGj1htRKlsv3iYqrApFDowkR5spyW1z:1Aih/aFG5htR+Yqc/8w3pyWB
Static task
static1
Behavioral task
behavioral1
Sample
88fd2273dba726f8e93082eef548564c84ee1f3be9f69a7d02ef9a3ed7f8ea18.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
185.222.58.80:55615
Targets
-
-
Target
88fd2273dba726f8e93082eef548564c84ee1f3be9f69a7d02ef9a3ed7f8ea18.exe
-
Size
690KB
-
MD5
01d452e81b85a3d399a247852f2f5004
-
SHA1
b1b5bb7edf69875726ea1c627fb0bbef6215143a
-
SHA256
88fd2273dba726f8e93082eef548564c84ee1f3be9f69a7d02ef9a3ed7f8ea18
-
SHA512
d1f62c8a067f9d2a241cc4604883e41aa9860fd09719ba2827dd0f2de9920411e62b57b9ba7a1e5184736c473ba4d621e31a194224a513de66a2879131c8f9bb
-
SSDEEP
12288:QPSg4dwyerVbCx3YNAguNN9WSrLuWXSAdVPOgOFHSLWB0io0CJohPCAOkR:2Sg4WrVbCx3YNhuNN9tW/A7OgOkQtC0V
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2