General
-
Target
0e2bc3bbb537be685839790e355fe7f5.exe
-
Size
538KB
-
Sample
241031-y7rslatcrm
-
MD5
0e2bc3bbb537be685839790e355fe7f5
-
SHA1
ea521b538d2edda4663aa9a287c3a8eb04dfc943
-
SHA256
3a52334a83d46e6cb089b679a46ba9c139f784899f6f93866ebb92d74d3f7419
-
SHA512
d4c49c4a2ba2be93acc47a5ec1a34538b41e341452b1d98372f41079a739d0e8ebb6d2fd3cfce273bbc7a638530ec5889957a37425357b8cbc5cd7aa2f9d7dcf
-
SSDEEP
12288:hMfzu3uphyrk6J6/FmO9pmJI08L4lspyk1MlmV8kR:hsZyrkA6/MO9pmJCdpykiC
Static task
static1
Behavioral task
behavioral1
Sample
0e2bc3bbb537be685839790e355fe7f5.exe
Resource
win7-20241010-en
Malware Config
Extracted
redline
cheat
185.222.58.240:55615
Targets
-
-
Target
0e2bc3bbb537be685839790e355fe7f5.exe
-
Size
538KB
-
MD5
0e2bc3bbb537be685839790e355fe7f5
-
SHA1
ea521b538d2edda4663aa9a287c3a8eb04dfc943
-
SHA256
3a52334a83d46e6cb089b679a46ba9c139f784899f6f93866ebb92d74d3f7419
-
SHA512
d4c49c4a2ba2be93acc47a5ec1a34538b41e341452b1d98372f41079a739d0e8ebb6d2fd3cfce273bbc7a638530ec5889957a37425357b8cbc5cd7aa2f9d7dcf
-
SSDEEP
12288:hMfzu3uphyrk6J6/FmO9pmJI08L4lspyk1MlmV8kR:hsZyrkA6/MO9pmJCdpykiC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-