General
-
Target
d66aa5d9471168e262c16636a54de48022b6f75b622f8d1faf74c31087ef9964
-
Size
7.2MB
-
Sample
241110-tn393azfrr
-
MD5
4ea9c69a064252d4938f1a13fa2f47f5
-
SHA1
e6d38869c2fbf53ea8dc5e16d0493d652ea0ac25
-
SHA256
d66aa5d9471168e262c16636a54de48022b6f75b622f8d1faf74c31087ef9964
-
SHA512
162e02cca59e3c273140cc09ae39c8507d6aeecee6d508b48bec757ce3b3bf295d81b5c92ccc5b59bbadf2108aa3537c7fdf22a772f5964fbf6e094b2a8d8188
-
SSDEEP
196608:hHdF2nfEUmkUl9pl9geWBXkQvqQ4xGn07xa:NdqfEDpXr938ZvhnQa
Static task
static1
Behavioral task
behavioral1
Sample
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
cheat
45.141.215.79:1639
Targets
-
-
Target
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2
-
Size
7.2MB
-
MD5
7212e623e04d3427364e7f00a95bf932
-
SHA1
5f8e0384cf7c209d804d9b10e3d2281a9c391fe7
-
SHA256
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2
-
SHA512
3a2ac1111eaaf17475235ee233819286848c45bb2d69a42803fde15f4ae609f63120ca3a9f945b80af1a7c565941e81513ecb90ef9ea1320240c81f77091f7df
-
SSDEEP
196608:r+QDCeRpnhgR/BQ+/Svwj47kuTkGfxDlDlAs:s6MQ+/SvwOvY4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-