General
-
Target
4dcb640873597f71cf9f0f6c3fbda8fee9cbbccbec182fc71131f8752d49f89b
-
Size
1.0MB
-
Sample
241220-y2143stmgm
-
MD5
e6e32a5c1b621f034a269936e3a44c1e
-
SHA1
ca923c8b646a5b0b7a99d82e2c8e23c1379870c7
-
SHA256
4dcb640873597f71cf9f0f6c3fbda8fee9cbbccbec182fc71131f8752d49f89b
-
SHA512
225ebd4d9d1c4c21ef10b4556bc77660e902942ef8b5a71a796d4961b5e03746af6bfd5e7f6e46bc744ac1e2843c1999bfd6572719546e97dd8c57913fad52e0
-
SSDEEP
24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8aAbdjgk:tTvC/MTQYxsWR7aAbdjg
Static task
static1
Behavioral task
behavioral1
Sample
4dcb640873597f71cf9f0f6c3fbda8fee9cbbccbec182fc71131f8752d49f89b.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
185.222.58.84:55615
Targets
-
-
Target
4dcb640873597f71cf9f0f6c3fbda8fee9cbbccbec182fc71131f8752d49f89b
-
Size
1.0MB
-
MD5
e6e32a5c1b621f034a269936e3a44c1e
-
SHA1
ca923c8b646a5b0b7a99d82e2c8e23c1379870c7
-
SHA256
4dcb640873597f71cf9f0f6c3fbda8fee9cbbccbec182fc71131f8752d49f89b
-
SHA512
225ebd4d9d1c4c21ef10b4556bc77660e902942ef8b5a71a796d4961b5e03746af6bfd5e7f6e46bc744ac1e2843c1999bfd6572719546e97dd8c57913fad52e0
-
SSDEEP
24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8aAbdjgk:tTvC/MTQYxsWR7aAbdjg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-