General
-
Target
c6452030b5c3054bc311e285ff98f147df2cd50898801cade4dc27974d54f357.exe
-
Size
2.5MB
-
Sample
241101-f5kbmaypbj
-
MD5
60fbf5e1f59e35aac3fb573b1d136b07
-
SHA1
f3ca4be74fcfc3b7eee2d6a000267ff543e9186a
-
SHA256
c6452030b5c3054bc311e285ff98f147df2cd50898801cade4dc27974d54f357
-
SHA512
82705fc4fbc8e9fa1152ea60afdd9cc6d0e9051b43b8b8f60874bba0d86c0a821c1d605c77ea48a3760a5b740f101ee7af00f74d8a10b3c4f6b9e5dab1a092e5
-
SSDEEP
12288:mmqbNcTkr9j6uAuhwlZOipwR5EsGvFvcn5S5tW:WNcTMl6uv8ZhlRcnMjW
Static task
static1
Behavioral task
behavioral1
Sample
c6452030b5c3054bc311e285ff98f147df2cd50898801cade4dc27974d54f357.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
pee
188.190.10.10:55123
Targets
-
-
Target
c6452030b5c3054bc311e285ff98f147df2cd50898801cade4dc27974d54f357.exe
-
Size
2.5MB
-
MD5
60fbf5e1f59e35aac3fb573b1d136b07
-
SHA1
f3ca4be74fcfc3b7eee2d6a000267ff543e9186a
-
SHA256
c6452030b5c3054bc311e285ff98f147df2cd50898801cade4dc27974d54f357
-
SHA512
82705fc4fbc8e9fa1152ea60afdd9cc6d0e9051b43b8b8f60874bba0d86c0a821c1d605c77ea48a3760a5b740f101ee7af00f74d8a10b3c4f6b9e5dab1a092e5
-
SSDEEP
12288:mmqbNcTkr9j6uAuhwlZOipwR5EsGvFvcn5S5tW:WNcTMl6uv8ZhlRcnMjW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4