General
-
Target
2024-12-10_e2d52a4ec25873e02c7456353d4bc8a5_formbook_hiddentear
-
Size
618KB
-
Sample
241210-cbazbazjav
-
MD5
e2d52a4ec25873e02c7456353d4bc8a5
-
SHA1
23819b1aad03c01afea7cc31fca230d7e929c96e
-
SHA256
2d979f5b8095c434260084a058d8c1ae25f3bef0953bbd458a6f7deb84ed138f
-
SHA512
f80ad169c4ae0d53ff365c1eb754ff543515acdf8f55f1a8101724904ed81917b161792693348f8db683b64a34b188747cf3def2e8c9a78b5a7159d86af6fcdf
-
SSDEEP
12288:sPG7rdWCDXNfLaJP/dQH1X0RiNQQ8xZoYC+jdAA:/JWIXtkQV0RiyoiA
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-10_e2d52a4ec25873e02c7456353d4bc8a5_formbook_hiddentear.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
45.154.98.212:15965
Targets
-
-
Target
2024-12-10_e2d52a4ec25873e02c7456353d4bc8a5_formbook_hiddentear
-
Size
618KB
-
MD5
e2d52a4ec25873e02c7456353d4bc8a5
-
SHA1
23819b1aad03c01afea7cc31fca230d7e929c96e
-
SHA256
2d979f5b8095c434260084a058d8c1ae25f3bef0953bbd458a6f7deb84ed138f
-
SHA512
f80ad169c4ae0d53ff365c1eb754ff543515acdf8f55f1a8101724904ed81917b161792693348f8db683b64a34b188747cf3def2e8c9a78b5a7159d86af6fcdf
-
SSDEEP
12288:sPG7rdWCDXNfLaJP/dQH1X0RiNQQ8xZoYC+jdAA:/JWIXtkQV0RiyoiA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-