General
-
Target
eec7f068324c6e768570df081709347e9d2ff309add8f8f74aa23fe3f08ac8b0
-
Size
554KB
-
Sample
241105-ll91ts1ndp
-
MD5
e3a13d849b73df0c24b0b2c55977344b
-
SHA1
7e50522d7965ea444e0c2e8e1cc5fb2d98cbdc8f
-
SHA256
eec7f068324c6e768570df081709347e9d2ff309add8f8f74aa23fe3f08ac8b0
-
SHA512
b765e754e87b13b1d70b0a2038c058f1b2a58c59039b6de7c345e9aa68296e7400a0110d9933877fc3ef3a6d39e7f67c16975bd1b08cfcd24a814d930c623d2d
-
SSDEEP
12288:KShjT5h9mBjYXCmmA7FVsoatvquGkNMECfglGngZUrKFYrLF7Le0:KSFTVmWXC4FVAtCIsfglGaOK0l
Static task
static1
Behavioral task
behavioral1
Sample
DOCUSIGN_00988766483647362PDF.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
ballablaq957.duckdns.org:36100
Targets
-
-
Target
DOCUSIGN_00988766483647362PDF.exe
-
Size
711KB
-
MD5
bf209ba4ae02bbe417fd2156c300d8ef
-
SHA1
ffb2dbff1324fb1d196c04b0fa343881875173f6
-
SHA256
98461ea447a9f8dc6b2d2f3a612d424bd0761ddffa94344766fce5ca6e0a378a
-
SHA512
3bcb55cd5d9a8087eebe75201d521bd5612bd203562a077fcab8d9a24dff78f1af6217af80ed7b9f67337e3578a60ab9d6bdfc56f3b9d04469921a1528bcb10b
-
SSDEEP
12288:+AmtiK5ozLsAN4H9OeNikPur3GlZ9F/1mbT4euKxQSiyyjK:n+FozbfeskmClZL/MvuKKd8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of SetThreadContext
-