General
-
Target
15102024_0112_Bank Account Confirmation.cmd.zip
-
Size
53KB
-
Sample
241015-bknfbszelq
-
MD5
c540fa259026e3e853d1409f5d5e9d58
-
SHA1
528a8b8751d5638190a717147a0989020afc2ef6
-
SHA256
c8594a268c014caf03a4e6c0ee8369be1e4f8888129f10afbe66f41319a019ef
-
SHA512
a080ff609c40f81c1f1a5f3f183bdb8c138c066a5190979cc814a1d5a99ffe3214f0e8fac640b332f5a439a522b45d625a231b106749ef7e7419ace78cc375ed
-
SSDEEP
1536:1xrRtz9FtKHX293fiABf7LBUBUlleLbf0o7msO+PPt1UF:v/9OGDBqBy8Mb4u
Static task
static1
Behavioral task
behavioral1
Sample
Bank Account Confirmation.cmd
Resource
win7-20240903-en
Malware Config
Extracted
redline
kay
51.195.145.93:1886
Targets
-
-
Target
Bank Account Confirmation.cmd
-
Size
75KB
-
MD5
a1f610b023f0ee41cf49ff8f1c65cd69
-
SHA1
9eb5aef9ec56315b68125fab688e7da0f1c047c7
-
SHA256
b88f42d17c704ef4c967e9a1dc44df19c78f7778b4dd8b804d672bb8dc4b388b
-
SHA512
9ac1b320dba8ad3e2649d536c7d5c2c00bf7e392c067f639cba722128e984f914920bb9a32502d27005359fcfb6e353c9f1a70eb421f158eb09fcadce8b4ee38
-
SSDEEP
1536:ZVMZoZknhzcJZwc+ADr8syGShOY3C+BuRV0B/FHP3vfcC:AZvh+fDr7YuRg/FHvnd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Blocklisted process makes network request
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-