General
-
Target
44ac97b6723a8891e15f2ef96f4535696c3639d5bf39f9735166d6953a8ea7df
-
Size
584KB
-
Sample
241121-26eneswqeq
-
MD5
b96b503003507a572cfe9b9a965cb674
-
SHA1
d51d504edd228b10e86781f34b6b40a0bd8d3a63
-
SHA256
44ac97b6723a8891e15f2ef96f4535696c3639d5bf39f9735166d6953a8ea7df
-
SHA512
264e76e26b01da9e8283f4dcf223abc047ff3ce295d5055b8bb62f2f32b3d3f6c6833a7377cbec9f407557348232583d4d5b2224aad2e65897491e5dda2987e2
-
SSDEEP
12288:CrO4+Ri3AgFddg/URon84aYKZA1bBxlGgEr6IMXeob7bsZx75xLYz1S:nQ3Ag6/UqnuSNXErkBb7bOx75KBS
Static task
static1
Behavioral task
behavioral1
Sample
44ac97b6723a8891e15f2ef96f4535696c3639d5bf39f9735166d6953a8ea7df.exe
Resource
win7-20240729-en
Malware Config
Extracted
redline
cheat
185.222.58.241:55615
Targets
-
-
Target
44ac97b6723a8891e15f2ef96f4535696c3639d5bf39f9735166d6953a8ea7df
-
Size
584KB
-
MD5
b96b503003507a572cfe9b9a965cb674
-
SHA1
d51d504edd228b10e86781f34b6b40a0bd8d3a63
-
SHA256
44ac97b6723a8891e15f2ef96f4535696c3639d5bf39f9735166d6953a8ea7df
-
SHA512
264e76e26b01da9e8283f4dcf223abc047ff3ce295d5055b8bb62f2f32b3d3f6c6833a7377cbec9f407557348232583d4d5b2224aad2e65897491e5dda2987e2
-
SSDEEP
12288:CrO4+Ri3AgFddg/URon84aYKZA1bBxlGgEr6IMXeob7bsZx75xLYz1S:nQ3Ag6/UqnuSNXErkBb7bOx75KBS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-