General
-
Target
b3af9675cef7e3a371e7a3d98d141b2bc6cbbc5da2df140dc09cf918ee3c62da.exe
-
Size
807KB
-
Sample
241125-ddwjgazqgr
-
MD5
4376650c9845c351ba30d405b17d3502
-
SHA1
5c2d70381a10d51d776365eea6f513a85597b3f3
-
SHA256
b3af9675cef7e3a371e7a3d98d141b2bc6cbbc5da2df140dc09cf918ee3c62da
-
SHA512
6b5c65c0cbd55ba99cf1b176f9073c3009bb8588a22c6ae9e8aa9ab1edd4514e2939e2882c7d2cc06112a47ecd384974c6fca6c3ffd94bc5e355790349b5f19a
-
SSDEEP
12288:LcsCELA+12Hd5lpvS36pDfi/xN3xKwcOrrNCtzV2VzxWWopuRJqbs4COMTp8bDx5:89Orr0zVKzxW1AJq0OPqpAEmnc
Static task
static1
Behavioral task
behavioral1
Sample
b3af9675cef7e3a371e7a3d98d141b2bc6cbbc5da2df140dc09cf918ee3c62da.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
185.222.58.241:55615
Targets
-
-
Target
b3af9675cef7e3a371e7a3d98d141b2bc6cbbc5da2df140dc09cf918ee3c62da.exe
-
Size
807KB
-
MD5
4376650c9845c351ba30d405b17d3502
-
SHA1
5c2d70381a10d51d776365eea6f513a85597b3f3
-
SHA256
b3af9675cef7e3a371e7a3d98d141b2bc6cbbc5da2df140dc09cf918ee3c62da
-
SHA512
6b5c65c0cbd55ba99cf1b176f9073c3009bb8588a22c6ae9e8aa9ab1edd4514e2939e2882c7d2cc06112a47ecd384974c6fca6c3ffd94bc5e355790349b5f19a
-
SSDEEP
12288:LcsCELA+12Hd5lpvS36pDfi/xN3xKwcOrrNCtzV2VzxWWopuRJqbs4COMTp8bDx5:89Orr0zVKzxW1AJq0OPqpAEmnc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-