General
-
Target
8d6eb147e9f5a3b0982844feda99dfb8572c1c9ae05e06248b012fc7e3f90d95N.exe
-
Size
551KB
-
Sample
241112-gg93tawfkg
-
MD5
08954896c00964d3b4b7f4141c5eaa2a
-
SHA1
4fd648890d357c14928bd8c8c5295702b870841b
-
SHA256
278b095c0694af6600aea03963b86d9b19c2811651ca792508de36c7ec55a250
-
SHA512
d1bd743329801f4871ef0c4fb29d9e939f727e48f28a55ac9d309384d866bfc15926570184ef26d7f3d23cc0221dc2d33e86e8d994e17890ad3a5ee713807924
-
SSDEEP
12288:hhQbEeX/zYMIxKzS7no9YB6Hd5fZoyr+oqfk2Aqk4:hh0//PIV7ob/oyr+oq7
Static task
static1
Behavioral task
behavioral1
Sample
8d6eb147e9f5a3b0982844feda99dfb8572c1c9ae05e06248b012fc7e3f90d95N.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
45.137.22.248:55615
Targets
-
-
Target
8d6eb147e9f5a3b0982844feda99dfb8572c1c9ae05e06248b012fc7e3f90d95N.exe
-
Size
551KB
-
MD5
08954896c00964d3b4b7f4141c5eaa2a
-
SHA1
4fd648890d357c14928bd8c8c5295702b870841b
-
SHA256
278b095c0694af6600aea03963b86d9b19c2811651ca792508de36c7ec55a250
-
SHA512
d1bd743329801f4871ef0c4fb29d9e939f727e48f28a55ac9d309384d866bfc15926570184ef26d7f3d23cc0221dc2d33e86e8d994e17890ad3a5ee713807924
-
SSDEEP
12288:hhQbEeX/zYMIxKzS7no9YB6Hd5fZoyr+oqfk2Aqk4:hh0//PIV7ob/oyr+oq7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-