General
-
Target
55c9a76d39d5d236202271d56bdf3e8357fc1b15458030a46a628e6ab4443bce.exe
-
Size
445KB
-
Sample
250103-d74ryaxrdt
-
MD5
8aff3d560eb4e4550f839bb25a23f33b
-
SHA1
e531081a7b1697ebf78e9d696d3794cf569d4346
-
SHA256
55c9a76d39d5d236202271d56bdf3e8357fc1b15458030a46a628e6ab4443bce
-
SHA512
76cd25086287b70b53f5f4d674c1fa3b1b49c5e3c94e45134b7b989d1d3cfd8ac96983a0da0e081fd2c39a328e9313b6fac9c10b01b386c16948a336fb084658
-
SSDEEP
12288:5b5pP4Tbe1LsRU8z0gS5trj6kR3iOjbzTVGg:p5pP4TbYq0gSPxQMVGg
Static task
static1
Behavioral task
behavioral1
Sample
55c9a76d39d5d236202271d56bdf3e8357fc1b15458030a46a628e6ab4443bce.exe
Resource
win7-20241023-en
Malware Config
Extracted
redline
cheat
154.91.34.250:14555
Targets
-
-
Target
55c9a76d39d5d236202271d56bdf3e8357fc1b15458030a46a628e6ab4443bce.exe
-
Size
445KB
-
MD5
8aff3d560eb4e4550f839bb25a23f33b
-
SHA1
e531081a7b1697ebf78e9d696d3794cf569d4346
-
SHA256
55c9a76d39d5d236202271d56bdf3e8357fc1b15458030a46a628e6ab4443bce
-
SHA512
76cd25086287b70b53f5f4d674c1fa3b1b49c5e3c94e45134b7b989d1d3cfd8ac96983a0da0e081fd2c39a328e9313b6fac9c10b01b386c16948a336fb084658
-
SSDEEP
12288:5b5pP4Tbe1LsRU8z0gS5trj6kR3iOjbzTVGg:p5pP4TbYq0gSPxQMVGg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-