General
-
Target
4ae69707fe39339915373a1ec3adaea49a73a9656c99fe27ecda591049be9d53.exe
-
Size
607KB
-
Sample
250111-dm2f3stmar
-
MD5
9451be6a28dc660c832d444f7cc53a58
-
SHA1
077f6a146080489988113104f6b9985c9e806290
-
SHA256
4ae69707fe39339915373a1ec3adaea49a73a9656c99fe27ecda591049be9d53
-
SHA512
0ed05ba676db20cea8e7ea5aae10d215cdb7d22ce82dc7e8c7b433833b67896bc816fa4512d08b427f566d4e012384d44e9f2106e4e59287699ef200c8770c51
-
SSDEEP
12288:4nl1cUoV+I4MVKWE5SXa+1nhCF3pGtBM63blYrw2n5nh8zHB:4nluRgJSt9tD3blYrw8/0HB
Static task
static1
Behavioral task
behavioral1
Sample
4ae69707fe39339915373a1ec3adaea49a73a9656c99fe27ecda591049be9d53.exe
Resource
win7-20241010-en
Malware Config
Extracted
redline
cheat
185.222.57.94:55615
Targets
-
-
Target
4ae69707fe39339915373a1ec3adaea49a73a9656c99fe27ecda591049be9d53.exe
-
Size
607KB
-
MD5
9451be6a28dc660c832d444f7cc53a58
-
SHA1
077f6a146080489988113104f6b9985c9e806290
-
SHA256
4ae69707fe39339915373a1ec3adaea49a73a9656c99fe27ecda591049be9d53
-
SHA512
0ed05ba676db20cea8e7ea5aae10d215cdb7d22ce82dc7e8c7b433833b67896bc816fa4512d08b427f566d4e012384d44e9f2106e4e59287699ef200c8770c51
-
SSDEEP
12288:4nl1cUoV+I4MVKWE5SXa+1nhCF3pGtBM63blYrw2n5nh8zHB:4nluRgJSt9tD3blYrw8/0HB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-