General
-
Target
8ae5c67ba12d7028d34831679c57f372.bin
-
Size
512KB
-
Sample
250113-bt3avayngt
-
MD5
064078b8cb231868fa8ff627e3750abc
-
SHA1
66246630253a59522534053daf749c91626ead42
-
SHA256
97dfb96998de3daafb3e7d67c2ae4e6ec311d2eb9ee72122327fef0cb8a7825c
-
SHA512
e641ea04f3a76edfb35d9e1311380b2f7dd59a96db400ebc6dd064fb01e6c886ae249d5c6aa7c2ea4330a583f01afa87e486b8d4508df49561a0e73524b90417
-
SSDEEP
12288:Ab4jWWN3YNkiyBaQbhs7b5qS96p4xvJpiboYo0IPBv4Efakq:c4jz1YNkVNl0A2SoYo0yBv7q
Static task
static1
Behavioral task
behavioral1
Sample
31a2ec31c4722d3011b75595c76e677aba7e5bc164c667d709943893ebea4f97.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
185.222.57.77:55615
Targets
-
-
Target
31a2ec31c4722d3011b75595c76e677aba7e5bc164c667d709943893ebea4f97.exe
-
Size
666KB
-
MD5
8ae5c67ba12d7028d34831679c57f372
-
SHA1
76d36117d58b5c801c2d698eddc414b0a06bed05
-
SHA256
31a2ec31c4722d3011b75595c76e677aba7e5bc164c667d709943893ebea4f97
-
SHA512
7d18bfa40ddd24df9e656861f3f7854d7f8baa12b8c354665f07dc88e535e9a12e23a9e9aaed5ed093d51effc8aaff899a4a18053f6ae3efb3e6f3afa5ce42f0
-
SSDEEP
12288:GTBtWYMV+I4MVKW84KMmxGSeR6NKPpdCVsYJabrUKcQO++Zzo+JdNS2tJHB:wLGRgl4KMnSGzYJpKch++Ro+k2tJHB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-