General
-
Target
b85140d8f018b50554acd3fedf3750d878aca1dbf58b3157b30209e361764736
-
Size
1.2MB
-
Sample
241108-m94pdstmhj
-
MD5
65b2f13ba5e5cdad5e053de3791d2eb4
-
SHA1
07059e245b7068f205b61da49b3caf514dc25761
-
SHA256
b85140d8f018b50554acd3fedf3750d878aca1dbf58b3157b30209e361764736
-
SHA512
0cd9aa68e7f0c8c7447a8bc620c928f59a4b32e80c6b453cfde55c20242539d89f9d5c8baafcd56b776509b89cb2713c29f76e0fd4563c91c3ba9c8fd4b2c24a
-
SSDEEP
12288:zXbZRm+GBCij769yptQkM2V4LNS8bMNKV0t76ih/:jbZRmjdVCj2MSbNKEx
Static task
static1
Behavioral task
behavioral1
Sample
HEEX-SO010483.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
client
104.243.33.119:300
Targets
-
-
Target
HEEX-SO010483.exe
-
Size
594KB
-
MD5
39c7a9eb89bfd37f75b680390e556709
-
SHA1
a05349b8760937693077cff5887444e1b20b6b19
-
SHA256
c96a4929bbf67a9c4dca1da11d932a3ff8a4e0702933aa30c3835559f6771d0c
-
SHA512
11394ab6dd63e2ecf68c407fb93a820aa926c7ca76812f68a8d0a3984297e41f91408192f86e67f3990005e251c13d67fff9046579ed0b6a30d28f0dc9109f85
-
SSDEEP
12288:gXbZRm+GBCij769yptQkM2V4LNS8bMNKV0t76ih/:cbZRmjdVCj2MSbNKEx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-