General
-
Target
3b2aa924c5c1d7b9136d550099fd0df701352c525baa6f0b9eb45f8d26909386N.exe
-
Size
717KB
-
Sample
241206-wpzpdaznbw
-
MD5
0a9d930c8197280d445552cfef7523d0
-
SHA1
2851de0b6b8aec4e7262196db88b59040d184ee1
-
SHA256
3b2aa924c5c1d7b9136d550099fd0df701352c525baa6f0b9eb45f8d26909386
-
SHA512
81767b79197e3ccc82a90e6dc3de77d394df8019f297e19589f487a7342ddb9696adf60a1627a3c5aebecaaf57d9fac334ab646ccf216574fd7239b7f205d903
-
SSDEEP
12288:L/ahzqGIoQl1RrN4wsT88ZLdIpT4bKzZrqr:uOhGwM5b4Ju
Static task
static1
Behavioral task
behavioral1
Sample
3b2aa924c5c1d7b9136d550099fd0df701352c525baa6f0b9eb45f8d26909386N.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
185.222.58.87:55615
Targets
-
-
Target
3b2aa924c5c1d7b9136d550099fd0df701352c525baa6f0b9eb45f8d26909386N.exe
-
Size
717KB
-
MD5
0a9d930c8197280d445552cfef7523d0
-
SHA1
2851de0b6b8aec4e7262196db88b59040d184ee1
-
SHA256
3b2aa924c5c1d7b9136d550099fd0df701352c525baa6f0b9eb45f8d26909386
-
SHA512
81767b79197e3ccc82a90e6dc3de77d394df8019f297e19589f487a7342ddb9696adf60a1627a3c5aebecaaf57d9fac334ab646ccf216574fd7239b7f205d903
-
SSDEEP
12288:L/ahzqGIoQl1RrN4wsT88ZLdIpT4bKzZrqr:uOhGwM5b4Ju
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-