General
-
Target
020ec1df3b8b9d28da16edaf0d50a262.exe
-
Size
522KB
-
Sample
241117-cjd1yasqek
-
MD5
020ec1df3b8b9d28da16edaf0d50a262
-
SHA1
b9b841c39445febc098f7edbda4112194615fc10
-
SHA256
6eaf9b6af911a7995d490906ff5d42a36a47e4b1d4510f6fc33c7cdab2c80aae
-
SHA512
214c186d842409891d905d612223b944ec8e0d86cb344aada20e35b211ec908c84469d266d961162e7d70d4300471c7d9ce1401e7552b10d8d7d9412b96d5261
-
SSDEEP
12288:IMyCpQuRWIPxTIeVJbZnjlz3W/9Fex4XmwRzbgTzzha+:IMyCQuHzHx6/XeKXJy1
Static task
static1
Behavioral task
behavioral1
Sample
020ec1df3b8b9d28da16edaf0d50a262.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
45.137.22.126:55615
Targets
-
-
Target
020ec1df3b8b9d28da16edaf0d50a262.exe
-
Size
522KB
-
MD5
020ec1df3b8b9d28da16edaf0d50a262
-
SHA1
b9b841c39445febc098f7edbda4112194615fc10
-
SHA256
6eaf9b6af911a7995d490906ff5d42a36a47e4b1d4510f6fc33c7cdab2c80aae
-
SHA512
214c186d842409891d905d612223b944ec8e0d86cb344aada20e35b211ec908c84469d266d961162e7d70d4300471c7d9ce1401e7552b10d8d7d9412b96d5261
-
SSDEEP
12288:IMyCpQuRWIPxTIeVJbZnjlz3W/9Fex4XmwRzbgTzzha+:IMyCQuHzHx6/XeKXJy1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-