General
-
Target
c40ba863d18db199355861f3ef34652fb467b1d311d0370b6c035fd9bc27b271.exe
-
Size
2.7MB
-
Sample
241119-w836xa1akr
-
MD5
bd45cc2f5e9358035c7a43d34972146f
-
SHA1
b54760726527814fedb9ad030f80325da599974c
-
SHA256
c40ba863d18db199355861f3ef34652fb467b1d311d0370b6c035fd9bc27b271
-
SHA512
40503df44242dced18622a10d8239a10a8951977ed2efef8a7a41ca65f6b9c519b7bbf73dcd6e3989a6d5ccfed82290bce194c140182c79ea443e7ed9958ffc5
-
SSDEEP
12288:GVfHSQAvvch1+6XDR/o9hcOPsBwlJgymOvujooTjaX:GZZAvvch06zNo9hcIlJljoTjaX
Static task
static1
Behavioral task
behavioral1
Sample
c40ba863d18db199355861f3ef34652fb467b1d311d0370b6c035fd9bc27b271.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
hyce
193.70.111.186:13484
Targets
-
-
Target
c40ba863d18db199355861f3ef34652fb467b1d311d0370b6c035fd9bc27b271.exe
-
Size
2.7MB
-
MD5
bd45cc2f5e9358035c7a43d34972146f
-
SHA1
b54760726527814fedb9ad030f80325da599974c
-
SHA256
c40ba863d18db199355861f3ef34652fb467b1d311d0370b6c035fd9bc27b271
-
SHA512
40503df44242dced18622a10d8239a10a8951977ed2efef8a7a41ca65f6b9c519b7bbf73dcd6e3989a6d5ccfed82290bce194c140182c79ea443e7ed9958ffc5
-
SSDEEP
12288:GVfHSQAvvch1+6XDR/o9hcOPsBwlJgymOvujooTjaX:GZZAvvch06zNo9hcIlJljoTjaX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4