General
-
Target
150c210067dbe7fe56d888c0f543f3cbb9c3a35b7301b640b023d3fca717cffb
-
Size
584KB
-
Sample
241120-yjkz5ssjh1
-
MD5
9cc2d2c760ca9153bfdc82fad4553aa5
-
SHA1
dc93ee1c5a32a4dbab2a4f909c549d07f0d48437
-
SHA256
150c210067dbe7fe56d888c0f543f3cbb9c3a35b7301b640b023d3fca717cffb
-
SHA512
1e39beb9f2db2f787f4b60cd4401668450be444228a7b9bbf35ebf35a9560a2b08bee7c5317e6455b938ec313178f8982621d089ceabb9c5ebdca15e2a272284
-
SSDEEP
12288:6rOjF+Ri3AgFdCvjn0GoDpjqKYjRhnby+rgnK3:qQ3Ag60GoDpWKKnbtruK3
Static task
static1
Behavioral task
behavioral1
Sample
150c210067dbe7fe56d888c0f543f3cbb9c3a35b7301b640b023d3fca717cffb.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
45.137.22.102:55615
Targets
-
-
Target
150c210067dbe7fe56d888c0f543f3cbb9c3a35b7301b640b023d3fca717cffb
-
Size
584KB
-
MD5
9cc2d2c760ca9153bfdc82fad4553aa5
-
SHA1
dc93ee1c5a32a4dbab2a4f909c549d07f0d48437
-
SHA256
150c210067dbe7fe56d888c0f543f3cbb9c3a35b7301b640b023d3fca717cffb
-
SHA512
1e39beb9f2db2f787f4b60cd4401668450be444228a7b9bbf35ebf35a9560a2b08bee7c5317e6455b938ec313178f8982621d089ceabb9c5ebdca15e2a272284
-
SSDEEP
12288:6rOjF+Ri3AgFdCvjn0GoDpjqKYjRhnby+rgnK3:qQ3Ag60GoDpWKKnbtruK3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-