General
-
Target
80ebb90ba41cb2a8cdb874bbfc673ada9dab505ea77220efffab52d4e3d5bd57
-
Size
533KB
-
Sample
241031-rd6lbszerl
-
MD5
70f48f08139b4da58d508ae9bfc93209
-
SHA1
a4e55f689ea128d8e64f78304661e5ab14ef893f
-
SHA256
80ebb90ba41cb2a8cdb874bbfc673ada9dab505ea77220efffab52d4e3d5bd57
-
SHA512
3b6528457e276d548e2ebebaaedfe110c1dc929bfd71d5b16b0e183809b71216c6761db509b68c854aa1153e8fe54b53e0adef4355eea4ecafce3b712acc355f
-
SSDEEP
12288:a0uR8sqpJ0qZMmUzsQSAlS5sj3lkupV2Y:nuRep/vUzsQSAYsj6uuY
Static task
static1
Behavioral task
behavioral1
Sample
Requirement.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
45.137.22.123:55615
Targets
-
-
Target
Requirement.exe
-
Size
634KB
-
MD5
c3307b63528b8e570569d4b4b7368328
-
SHA1
c7c461e05b8fdd696986788caa9140b38ead39e2
-
SHA256
d4985c80c9f08a1f1a5ff5e958b10982042f3dc71fbb7ae993b27f299eb65328
-
SHA512
f12eb9c9a646466c7c653598a099c63789840baa5c99e5a9f9b15d92781d75721b0809ca339638fdfa9d53595e5909be308043a7213c4353628b20c9bca359a3
-
SSDEEP
12288:zSFG23vhidCI951hNjUZ+y/m0kQpkJJmzEujvLlR6z9TjcQ1AQw9:+Q235CB51rjUMy/mLQ8svR61jd1AT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-