General
-
Target
67b86881d4a9c885b15f09006a97d91aaeba361eca20dfae0ee206e7c4d30f6d
-
Size
472KB
-
Sample
241028-135vrsybne
-
MD5
dc4312ebae5195179dcdc76ccd7444d6
-
SHA1
1e496e4d9e379d226dff7f1190c21221ac5ab686
-
SHA256
67b86881d4a9c885b15f09006a97d91aaeba361eca20dfae0ee206e7c4d30f6d
-
SHA512
629343f527ff690405569e55e198beaaa8d1adb55699faf99d51ae0b7bebcb822472ffc9450dc2ee1e324e14f073c6c82d4d29c90a37fb664cc8fe3bcae8895a
-
SSDEEP
12288:vij8icEWO7jdDlUDcXXxHhS03pOQfVN/IfSW78/F:vij8KOcRH8qpPH/IKWU
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION#09678.exe
Resource
win7-20241010-en
Malware Config
Extracted
redline
pee
188.190.10.10:55123
Targets
-
-
Target
QUOTATION#09678.exe
-
Size
1.7MB
-
MD5
92fa3cf6b7890df937fb45c0c5ec19cd
-
SHA1
8d4664ddaa346f2f2f7cee30aa8089b053ed404c
-
SHA256
b10245a0006dbd25079af51abd7cf48d195ce65d6f9f7b09e1cc52a3863fbac4
-
SHA512
265f53aaaebecfc594f622ed68b99807400e118b60af51586ec803196b3af07234249df7834a3a9bad7fdea3a2c3cdf590b835e290cb73056bc68fc5c6214a48
-
SSDEEP
12288:ooSDe4NfBlm9j6X6EVamHzhFfnINyZBpmU8Z:mS4Nf0j6X6E4mHNFfXBI7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-