General
-
Target
4929409c92d72721b3bee5b399b0f88a547c56f95a6369e0901cee26a83f3a03
-
Size
371KB
-
Sample
241105-z5bh9sydqh
-
MD5
0d31df1863f97a604a39b08f95e2f3b9
-
SHA1
0952c5b3bb51208a7fc2945ce912d08b4436088e
-
SHA256
4929409c92d72721b3bee5b399b0f88a547c56f95a6369e0901cee26a83f3a03
-
SHA512
2f0caf799b541c6dd055fabfb7fb9be03c25f868bf19a2f10397baac202f086e1149837f336f18a69293232aeaea0d5c64e269a6570c1843cc0463c513dbdcb7
-
SSDEEP
6144:FObzf8f+L0O/7rxgj5IveLe6SE8Bvx090JTs7Gi4aMC7QGS3s2uMAedtN5iou:b2Yugj5IeNSE8Bu+Op4RC23Z9AkN5iN
Behavioral task
behavioral1
Sample
f78477275d79d0eead0b62d3355df9be273518c54eeac3719a97823365cee858.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f78477275d79d0eead0b62d3355df9be273518c54eeac3719a97823365cee858.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
world10
jamesmillion.xyz:15772
-
auth_value
a74a2e49cd85c6f93cb4e7fc8691721c
Targets
-
-
Target
f78477275d79d0eead0b62d3355df9be273518c54eeac3719a97823365cee858
-
Size
488KB
-
MD5
4c596d32f75e3a84e48c36e8fc8025fd
-
SHA1
6a03c9d53e10c752b66b677e528fbcd1a70a6d0c
-
SHA256
f78477275d79d0eead0b62d3355df9be273518c54eeac3719a97823365cee858
-
SHA512
0b159fe0b1766c27c89f65069fb3d33a59b3fc3efd7519629497df3ec07eda1b938819a2b0faa6cf2c305a736c3c93d409d42901c744644e11867a06bd7796c2
-
SSDEEP
6144:k9Cq6V1jfMRWYYIveLu6SE8jvx09SJTs7ci4aMC7WGS3swOco36deigavwVfe5K0:fV1DopYIe1SE8juQOf4RCw3dJTxuuB
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-