General
-
Target
RFQ_TFS-1508-AL NASR ENGINEERING.exe
-
Size
1.4MB
-
Sample
241111-mpdbpsxmgy
-
MD5
d49ddb40b2037ac73988f82b820f4cd1
-
SHA1
a3b36cc36bdcf59c03794b3366a454ee0cb888d3
-
SHA256
24050e65286707adf974167b31a7443dbc40fe475d1cf2515fe1b318dfc0d4d7
-
SHA512
96deb0ffe41998f2866a71d9304877c1c20bd86b5cc5b48cb44398a516fb989473bbbf7084df2fe7f933d2ce594992966085df31276b324acc0f2c4950dc11a6
-
SSDEEP
12288:H3XhFxpSPO4ZhtlsiVWKDXbn849nKxqt7Q2:HhFxcmEhtfXxdV
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_TFS-1508-AL NASR ENGINEERING.exe
Resource
win7-20241010-en
Malware Config
Extracted
redline
hyce
193.70.111.186:13484
Targets
-
-
Target
RFQ_TFS-1508-AL NASR ENGINEERING.exe
-
Size
1.4MB
-
MD5
d49ddb40b2037ac73988f82b820f4cd1
-
SHA1
a3b36cc36bdcf59c03794b3366a454ee0cb888d3
-
SHA256
24050e65286707adf974167b31a7443dbc40fe475d1cf2515fe1b318dfc0d4d7
-
SHA512
96deb0ffe41998f2866a71d9304877c1c20bd86b5cc5b48cb44398a516fb989473bbbf7084df2fe7f933d2ce594992966085df31276b324acc0f2c4950dc11a6
-
SSDEEP
12288:H3XhFxpSPO4ZhtlsiVWKDXbn849nKxqt7Q2:HhFxcmEhtfXxdV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4