General
-
Target
3868b32b9aeabdd021b9f5d029a741304def18fa3c19a0fe4872e82939aac02d.cmd
-
Size
75KB
-
Sample
241017-brrrbsxhjk
-
MD5
832dd29f7ffd54f656233e56c588b4fd
-
SHA1
fd306aaaa8b2065f80773cf440e245f3120eef09
-
SHA256
3868b32b9aeabdd021b9f5d029a741304def18fa3c19a0fe4872e82939aac02d
-
SHA512
b5098bc78bb21a8a003b2b5a1c4950ff3a791e9a8543be51c7885b95999a1acef6bdffda9bb92ca2734f8b0f54a1572d9fb3dbdba322abae2d1057273529be10
-
SSDEEP
1536:udOgvVCMvAg6DhWpHjd62+6LiIB8KUDPGJ/oJzy:wVLAjDhWpjTfuPWIW
Static task
static1
Behavioral task
behavioral1
Sample
3868b32b9aeabdd021b9f5d029a741304def18fa3c19a0fe4872e82939aac02d.cmd
Resource
win7-20240903-en
Malware Config
Extracted
redline
tony
51.195.145.77:57942
Targets
-
-
Target
3868b32b9aeabdd021b9f5d029a741304def18fa3c19a0fe4872e82939aac02d.cmd
-
Size
75KB
-
MD5
832dd29f7ffd54f656233e56c588b4fd
-
SHA1
fd306aaaa8b2065f80773cf440e245f3120eef09
-
SHA256
3868b32b9aeabdd021b9f5d029a741304def18fa3c19a0fe4872e82939aac02d
-
SHA512
b5098bc78bb21a8a003b2b5a1c4950ff3a791e9a8543be51c7885b95999a1acef6bdffda9bb92ca2734f8b0f54a1572d9fb3dbdba322abae2d1057273529be10
-
SSDEEP
1536:udOgvVCMvAg6DhWpHjd62+6LiIB8KUDPGJ/oJzy:wVLAjDhWpjTfuPWIW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Blocklisted process makes network request
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-