General
-
Target
9af174ba505768998cc4a21c8064e2805b7c1f196c66b7fd75ce6e01d5eb7b80
-
Size
507KB
-
Sample
241115-l13kasselp
-
MD5
f27af94ad34a0195807b585652e55682
-
SHA1
593b614cab5935dc570f760cd8adefc3539015ce
-
SHA256
9af174ba505768998cc4a21c8064e2805b7c1f196c66b7fd75ce6e01d5eb7b80
-
SHA512
61eaf371c3f26c08d4b487092a50d747afee0d22c92681191bc6e796c71150060827ca5040f99875edba89f6096ba1aaf6332ca319a35b0402779ce4f7fb8dd2
-
SSDEEP
12288:LJ3HI6wCvDymkIr1xtn3oDg8KwumaWSXq3wN0WDDv33cGQb:LJHIQD9xtUfnNoqgiIDvMG2
Static task
static1
Behavioral task
behavioral1
Sample
9af174ba505768998cc4a21c8064e2805b7c1f196c66b7fd75ce6e01d5eb7b80.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
ltgmred21.duckdns.org:25228
Targets
-
-
Target
9af174ba505768998cc4a21c8064e2805b7c1f196c66b7fd75ce6e01d5eb7b80
-
Size
507KB
-
MD5
f27af94ad34a0195807b585652e55682
-
SHA1
593b614cab5935dc570f760cd8adefc3539015ce
-
SHA256
9af174ba505768998cc4a21c8064e2805b7c1f196c66b7fd75ce6e01d5eb7b80
-
SHA512
61eaf371c3f26c08d4b487092a50d747afee0d22c92681191bc6e796c71150060827ca5040f99875edba89f6096ba1aaf6332ca319a35b0402779ce4f7fb8dd2
-
SSDEEP
12288:LJ3HI6wCvDymkIr1xtn3oDg8KwumaWSXq3wN0WDDv33cGQb:LJHIQD9xtUfnNoqgiIDvMG2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-