General
-
Target
Redline-crack-by-rzt.zip
-
Size
21.7MB
-
Sample
241101-z6levsxkdm
-
MD5
1118549e87cbad92e6959506172d8c5d
-
SHA1
a5598c8355d03dc1ed03b0f7842d478d6a9e17fe
-
SHA256
54b542bd706838bc61c23ef8189935fc74e0099b14e509d33649b43ff108d85f
-
SHA512
029527677e3a316a0929a111701c87c5fe6c11ecc361a3c009de75ee06d110245d0f250fca836a1aa0a90f86237e3102bcdf60ed645a9b42ad04bd50793aa09c
-
SSDEEP
393216:l+4Ui5ywU1ePiV9BS9EUCEN3BULF937+zur/A5ELmLDepjHRKxH4ofr5sN5ltwFK:o4UiouCG3BULez1imLDoHk4SSTTwF6LB
Malware Config
Extracted
redline
cheat
127.0.0.1:1337
127.0.0.1:31731
Targets
-
-
Target
Redline-crack-by-rzt.zip
-
Size
21.7MB
-
MD5
1118549e87cbad92e6959506172d8c5d
-
SHA1
a5598c8355d03dc1ed03b0f7842d478d6a9e17fe
-
SHA256
54b542bd706838bc61c23ef8189935fc74e0099b14e509d33649b43ff108d85f
-
SHA512
029527677e3a316a0929a111701c87c5fe6c11ecc361a3c009de75ee06d110245d0f250fca836a1aa0a90f86237e3102bcdf60ed645a9b42ad04bd50793aa09c
-
SSDEEP
393216:l+4Ui5ywU1ePiV9BS9EUCEN3BULF937+zur/A5ELmLDepjHRKxH4ofr5sN5ltwFK:o4UiouCG3BULez1imLDoHk4SSTTwF6LB
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-