General
-
Target
5aa10b339b6e58a1c096d0423791826fbf026b18bf3d74d1237ddc40a53f8865
-
Size
1.0MB
-
Sample
241108-z6qpkssnel
-
MD5
998f2e5bceb6a1fab9c470c043f82d8f
-
SHA1
50808c742ee722a2fdcb8c4f0946ecf6b4a27712
-
SHA256
5aa10b339b6e58a1c096d0423791826fbf026b18bf3d74d1237ddc40a53f8865
-
SHA512
7186d645bb3b3206533bc0144f6d40fc5b38d3fdde5c0c58cf2ce9747021c522c92142bab7976493bfb67d11411cb0b9a592452685a82e6855e3b7adaa48151c
-
SSDEEP
24576:R5REvpAFcBNJkdxisqaq6qaqs6JpzuppLWDQ8o/irQnywTC8cmdWjo2QCbofAzEL:RARAFcBNJkdxisqaq6qaqs6JpzuppLWC
Static task
static1
Behavioral task
behavioral1
Sample
5aa10b339b6e58a1c096d0423791826fbf026b18bf3d74d1237ddc40a53f8865.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5aa10b339b6e58a1c096d0423791826fbf026b18bf3d74d1237ddc40a53f8865.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
perecrypt777
80.92.206.82:45827
Targets
-
-
Target
5aa10b339b6e58a1c096d0423791826fbf026b18bf3d74d1237ddc40a53f8865
-
Size
1.0MB
-
MD5
998f2e5bceb6a1fab9c470c043f82d8f
-
SHA1
50808c742ee722a2fdcb8c4f0946ecf6b4a27712
-
SHA256
5aa10b339b6e58a1c096d0423791826fbf026b18bf3d74d1237ddc40a53f8865
-
SHA512
7186d645bb3b3206533bc0144f6d40fc5b38d3fdde5c0c58cf2ce9747021c522c92142bab7976493bfb67d11411cb0b9a592452685a82e6855e3b7adaa48151c
-
SSDEEP
24576:R5REvpAFcBNJkdxisqaq6qaqs6JpzuppLWDQ8o/irQnywTC8cmdWjo2QCbofAzEL:RARAFcBNJkdxisqaq6qaqs6JpzuppLWC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-