General
-
Target
f6b09208c3523be3a490af2fc305d4574b38d95a435c8a55402fca38597e6dac
-
Size
647KB
-
Sample
241105-rcdh6a1qgx
-
MD5
68b2a6e71c0c904a9aeabfc9adbf7a21
-
SHA1
0577bcb0a9736b45f1eb92f6070aac2134e674dc
-
SHA256
f6b09208c3523be3a490af2fc305d4574b38d95a435c8a55402fca38597e6dac
-
SHA512
077b52bf789dca81f8155182eae1fa8ce529586f70a2cb8ce7298917fb6f42c83dcb1cb9274e498295bdda65d4d2d7dd41ef6ea086dfb510ef75c871fb8daf46
-
SSDEEP
12288:Q+KncNPCdkjtqD56vpunMKgabsvmyArpBAz9TjcQ1AQw9xkR:0mPCdkpqF6vpjmsenVBA1jd1AT+
Static task
static1
Behavioral task
behavioral1
Sample
f6b09208c3523be3a490af2fc305d4574b38d95a435c8a55402fca38597e6dac.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
45.137.22.248:55615
Targets
-
-
Target
f6b09208c3523be3a490af2fc305d4574b38d95a435c8a55402fca38597e6dac
-
Size
647KB
-
MD5
68b2a6e71c0c904a9aeabfc9adbf7a21
-
SHA1
0577bcb0a9736b45f1eb92f6070aac2134e674dc
-
SHA256
f6b09208c3523be3a490af2fc305d4574b38d95a435c8a55402fca38597e6dac
-
SHA512
077b52bf789dca81f8155182eae1fa8ce529586f70a2cb8ce7298917fb6f42c83dcb1cb9274e498295bdda65d4d2d7dd41ef6ea086dfb510ef75c871fb8daf46
-
SSDEEP
12288:Q+KncNPCdkjtqD56vpunMKgabsvmyArpBAz9TjcQ1AQw9xkR:0mPCdkpqF6vpjmsenVBA1jd1AT+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-