General
-
Target
0cc658fb92f2b744889a57d27d8005b24ded16ae15f3d73789a8afbfb2591ae6
-
Size
53KB
-
Sample
241015-e2c8gayemr
-
MD5
a8240bdfe38095fc68605ecbaf2907de
-
SHA1
905fcb139ed538ef15f92fd24115e9a42c52e816
-
SHA256
0cc658fb92f2b744889a57d27d8005b24ded16ae15f3d73789a8afbfb2591ae6
-
SHA512
5a3466b80c93f35637f87b578f7e71470374aeb361b4d73f4432a45d76b6e0ed5e5f56f1ad2f801b9b8a4998dea135073edd32cf190cfb336fa8dc6d8fab14df
-
SSDEEP
768:SesGCrUjc/i4pg1KRYa7a/TgT6R9ACuOL8QqnETPZRAGSiszCQKKleW/sVLUzqrh:8U4/hgXagCiTEErZYCQfsV95j
Static task
static1
Behavioral task
behavioral1
Sample
Bank Account Confirmation.cmd
Resource
win7-20240903-en
Malware Config
Extracted
redline
kay
51.195.145.93:1886
Targets
-
-
Target
Bank Account Confirmation.cmd
-
Size
75KB
-
MD5
283fbfbb411d1edabbe1cb21d366162e
-
SHA1
47a59150aff544fb2a3d90288b5e8895c15aba47
-
SHA256
44522dd5ad0f55465de4759cedae7ad4b88514df869bf1bf84cbec7d59fa5265
-
SHA512
f389ebda3b62060045acf5cfbffa40957ec6c21cd061e3d6fb98e11528bc6e198a3fa1da0a552e10058e65fa2141d07f24c1b526f73c3cc8d93e9b1698f1738f
-
SSDEEP
1536:3MnTcilr/sM2PyRzguf8qVL7MyjO4OxmmeLbXKxPpqFTi29tZL6c4:ITcilr07IkKl7qIXKRpqF+2w
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Blocklisted process makes network request
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-