General
-
Target
D666C758BE2A66A4C8E0D3C089EA75B1.exe
-
Size
634KB
-
Sample
250122-qext5symdk
-
MD5
d666c758be2a66a4c8e0d3c089ea75b1
-
SHA1
9ef031c211fb82b0810a45256ca9ad32f1577ad5
-
SHA256
9fd0ede72e03f6a4897daaa809a4dafa9b9e0eeac52c5244b11df40e9a4af2f2
-
SHA512
56931556326f41f360b31658ec4fb92104bc7610923429175d71e96e87258e22a574229fedc4262df52d33e631062a0710385131834399041d8ca9c89bf91f37
-
SSDEEP
12288:B89WXV7O3SdeYogO832DYJTX6Y8RJ8y/59ifSA1Bd/:ZOi4b83tf8RtB9i62BF
Static task
static1
Behavioral task
behavioral1
Sample
D666C758BE2A66A4C8E0D3C089EA75B1.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
45.137.22.227:55615
Targets
-
-
Target
D666C758BE2A66A4C8E0D3C089EA75B1.exe
-
Size
634KB
-
MD5
d666c758be2a66a4c8e0d3c089ea75b1
-
SHA1
9ef031c211fb82b0810a45256ca9ad32f1577ad5
-
SHA256
9fd0ede72e03f6a4897daaa809a4dafa9b9e0eeac52c5244b11df40e9a4af2f2
-
SHA512
56931556326f41f360b31658ec4fb92104bc7610923429175d71e96e87258e22a574229fedc4262df52d33e631062a0710385131834399041d8ca9c89bf91f37
-
SSDEEP
12288:B89WXV7O3SdeYogO832DYJTX6Y8RJ8y/59ifSA1Bd/:ZOi4b83tf8RtB9i62BF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-