General
-
Target
eafc692a6d315bbf8dc7b82e20c0f45b9118679db24944d62bcc0c94ecad1759
-
Size
248KB
-
Sample
241105-g7bmyaypdl
-
MD5
9e8b257ad787b88506fed142efc6d069
-
SHA1
dba899546de5a0420badd0ee752ce99694b579cf
-
SHA256
eafc692a6d315bbf8dc7b82e20c0f45b9118679db24944d62bcc0c94ecad1759
-
SHA512
eec3d22b8ccab359b5ee58bba8fc986560707a53fee380441ffc90040ac177ce264b6aaeec54ff5cfd909485d616db6692c2bf13f6939f3f37022ff32fc51e56
-
SSDEEP
6144:0zycH50CxIQ9Proib2UeSNlc/9QJgaK36+8i2Gr9uFnT4bVNW5etdK3S:0zFH55ISlNlc/9xP36IqTuVj7
Static task
static1
Behavioral task
behavioral1
Sample
29e7b2f96072f8e62948359199d5465ddfacc450705394ea6d29b7c77648026d.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
mtnnnn
103.153.79.195:24688
Targets
-
-
Target
29e7b2f96072f8e62948359199d5465ddfacc450705394ea6d29b7c77648026d
-
Size
278KB
-
MD5
e1e1853dec523ca69419c639ca12bc1f
-
SHA1
1e6586cabece300856232e50b0d00114feb53ed0
-
SHA256
29e7b2f96072f8e62948359199d5465ddfacc450705394ea6d29b7c77648026d
-
SHA512
6c0f2d6a0cfe207bce306fe55abe8b47479f856a3db55f1fc5a13c2eff7ee1144ec1ee71c073e587bdae24b77847d1ad08072632c9ff4c052643b35799023461
-
SSDEEP
6144:T/DBkuri/tJaHurBwKa6O56wxWtdRSGY1x3tA28Jgx18b:T/1kwMAawKUZwe3+qq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Drops startup file
-
Suspicious use of SetThreadContext
-