General
-
Target
0x0007000000023433-50
-
Size
705KB
-
Sample
241015-vhsf2swbnb
-
MD5
a3789c9b2a0bde3b59c7612879f8c9d4
-
SHA1
a938c3009fcccaedd361ac52c6f53667c60fc82f
-
SHA256
f338e5a346c8a6b3234270fc6e31e9232a37f80e18df9702f7dcf06dffeb969a
-
SHA512
65255c566dcb5b441c1cd9e7a42400b3158bbc7ae8bfadcc76ecc0a75d6d75ac2be3fc03985afd9b7c9b08c2993564d9b4f52fd6896eeb8fa157be57822e4718
-
SSDEEP
12288:WwHy90MAQMK4zypwqHsGIziL6v5H09sA7pjvSdXlyNBvMxX/Wmvc9nRh0rp:WwHyf0ypBzt2OeAxsXENBkx/WWc9nRh2
Static task
static1
Behavioral task
behavioral1
Sample
0x0007000000023433-50.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
0x0007000000023433-50.exe
Resource
win11-20241007-en
Malware Config
Extracted
redline
1
193.203.203.82:63851
Targets
-
-
Target
0x0007000000023433-50
-
Size
705KB
-
MD5
a3789c9b2a0bde3b59c7612879f8c9d4
-
SHA1
a938c3009fcccaedd361ac52c6f53667c60fc82f
-
SHA256
f338e5a346c8a6b3234270fc6e31e9232a37f80e18df9702f7dcf06dffeb969a
-
SHA512
65255c566dcb5b441c1cd9e7a42400b3158bbc7ae8bfadcc76ecc0a75d6d75ac2be3fc03985afd9b7c9b08c2993564d9b4f52fd6896eeb8fa157be57822e4718
-
SSDEEP
12288:WwHy90MAQMK4zypwqHsGIziL6v5H09sA7pjvSdXlyNBvMxX/Wmvc9nRh0rp:WwHyf0ypBzt2OeAxsXENBkx/WWc9nRh2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-