General
-
Target
ebe439a30d407f0538e51cba438bc7e601cd5e864d9546bbcabd8ada10662d6b
-
Size
554KB
-
Sample
241227-ggyd1ssmhq
-
MD5
0866aeb52183e280be3822f086da10b6
-
SHA1
3abb8b3c7566dbb4aaac7eba8a5e79e9215294bc
-
SHA256
ebe439a30d407f0538e51cba438bc7e601cd5e864d9546bbcabd8ada10662d6b
-
SHA512
b3e6cafe8028943afaf7ad924ccd54122872077bebb323f674c7403e6e6e2019bf0e566c3a19d150655023e884b47f0b9a129fa81f80d96a7c6fb900ecf6e05f
-
SSDEEP
12288:BVXqiT2PxG9kG/ODTVovIvQkMezNDl5IhaRwqTk89qPj/7c:DkU9F/BOJDjIURF8PXc
Static task
static1
Behavioral task
behavioral1
Sample
SAMPLES & QUANTITY.exe
Resource
win7-20241023-en
Malware Config
Extracted
redline
cheat
185.222.58.82:55615
Targets
-
-
Target
SAMPLES & QUANTITY.exe
-
Size
628KB
-
MD5
32dadf5259c17644e7605dd1382409d9
-
SHA1
65f98be9a8adea90f69dcd115fb82089b879ee5f
-
SHA256
78f637413574de4d2fae22693696d4f9e05bc3622c304ece3baa8788cff651c6
-
SHA512
755b9144d5db27da7d3954793b5992de35d495e665c43553782328693eb7310f0c34e1827e45796917db74c0d404ae87bc687a7eadfa5835ef8daf55f947a2bc
-
SSDEEP
12288:azVxGIaOq+A3RNoVMXQWPYUDdxFAvKRwqexk6k7hCPFO:aZxhaO+PYKASRWBktC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-