General
-
Target
947F58042679156DED0A2ECD613AAF41.exe
-
Size
666KB
-
Sample
250112-kv7rdsvqgz
-
MD5
947f58042679156ded0a2ecd613aaf41
-
SHA1
91427835794cc9a879fb74d87b031041fdc82de7
-
SHA256
f6c421af1d77e22e3ba248c90178894cd9c95c01397f1798c7d02a4442903e49
-
SHA512
3b3063749aff1908e8109a8a8cc4764e4625c35ec967734cc436894c897b5366c4cf8149860095b3770f8bff14dc9ccd7c2d97a8118cd6db8b0891104001d348
-
SSDEEP
12288:H8q4E6mfJiLl90WcbQkpClSMdy9AWSZZM119BKmA8K1NSI/VRWXI:IEkDApCl7U9WZZQBhA8Y9cX
Static task
static1
Behavioral task
behavioral1
Sample
947F58042679156DED0A2ECD613AAF41.exe
Resource
win7-20241010-en
Malware Config
Extracted
redline
cheat
185.222.58.254:55615
Targets
-
-
Target
947F58042679156DED0A2ECD613AAF41.exe
-
Size
666KB
-
MD5
947f58042679156ded0a2ecd613aaf41
-
SHA1
91427835794cc9a879fb74d87b031041fdc82de7
-
SHA256
f6c421af1d77e22e3ba248c90178894cd9c95c01397f1798c7d02a4442903e49
-
SHA512
3b3063749aff1908e8109a8a8cc4764e4625c35ec967734cc436894c897b5366c4cf8149860095b3770f8bff14dc9ccd7c2d97a8118cd6db8b0891104001d348
-
SSDEEP
12288:H8q4E6mfJiLl90WcbQkpClSMdy9AWSZZM119BKmA8K1NSI/VRWXI:IEkDApCl7U9WZZQBhA8Y9cX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-