General
-
Target
X48-EXT-Loader.exe
-
Size
3.1MB
-
Sample
241222-l86a6avjem
-
MD5
e581e122721fd49ac3bd16fd6873cf73
-
SHA1
cc39e5a0d9c597c13d064b483d85b17b2ea4b194
-
SHA256
eb37b4ffa493ed2235c6324772ffe5aeaf139017c62b9db98fda14e42df3336c
-
SHA512
b4344623ef3b65bedf5612841a8379b69f8fb0362bbc98499c4c43019992e04b35c179791f71f524c3d639cf10d146d0370d4139cb534cc06d8c0c7af572211a
-
SSDEEP
49152:zFWCBLUlZtEYk8QEFfM/AYWpJqzLzg5WDw94TqaSCK2PAnbuOEa2pz7kIls:1h8EYk89fM4YWp8WaNRAbufpzQI
Static task
static1
Behavioral task
behavioral1
Sample
X48-EXT-Loader.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
X48-EXT-Loader.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
5.0.5
FiveM
23.27.201.57:4449
f37qp84ilrw
-
delay
590
-
install
true
-
install_file
/WindowsRuntime/WindowsClientRuntime.exe
-
install_folder
%AppData%
Extracted
redline
rlma678DL4Op
23.27.201.57:1337
Targets
-
-
Target
X48-EXT-Loader.exe
-
Size
3.1MB
-
MD5
e581e122721fd49ac3bd16fd6873cf73
-
SHA1
cc39e5a0d9c597c13d064b483d85b17b2ea4b194
-
SHA256
eb37b4ffa493ed2235c6324772ffe5aeaf139017c62b9db98fda14e42df3336c
-
SHA512
b4344623ef3b65bedf5612841a8379b69f8fb0362bbc98499c4c43019992e04b35c179791f71f524c3d639cf10d146d0370d4139cb534cc06d8c0c7af572211a
-
SSDEEP
49152:zFWCBLUlZtEYk8QEFfM/AYWpJqzLzg5WDw94TqaSCK2PAnbuOEa2pz7kIls:1h8EYk89fM4YWp8WaNRAbufpzQI
-
Asyncrat family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-