General
-
Target
3052-1-0x0000000001370000-0x00000000017C2000-memory.dmp
-
Size
4.3MB
-
Sample
250205-mbb7gstlhp
-
MD5
5c883c43945c135676b6742c3a9532df
-
SHA1
e27ea722bc69b43b125d6a2eb23d9a37fe6b0580
-
SHA256
ee31c4cba6b4232ceafa3daa5c1e73249efdba57e4cb63f012b314b49c15d240
-
SHA512
c365c9aadfc714e0d46dea88a17281d0f22d3bc5deb1d409e8a314b403e6ba36c1f0610c746a1380ed70e26ae17337dc7f2db1c51f9981e25254b970fddaf75b
-
SSDEEP
98304:JxylZpEqZcrEAz3Cf+0rFVXxSyFzN0OpuLV+fN9c:SZCrdzyfjX4a50V+V9c
Behavioral task
behavioral1
Sample
3052-1-0x0000000001370000-0x00000000017C2000-memory.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
103.84.89.222:33791
Targets
-
-
Target
3052-1-0x0000000001370000-0x00000000017C2000-memory.dmp
-
Size
4.3MB
-
MD5
5c883c43945c135676b6742c3a9532df
-
SHA1
e27ea722bc69b43b125d6a2eb23d9a37fe6b0580
-
SHA256
ee31c4cba6b4232ceafa3daa5c1e73249efdba57e4cb63f012b314b49c15d240
-
SHA512
c365c9aadfc714e0d46dea88a17281d0f22d3bc5deb1d409e8a314b403e6ba36c1f0610c746a1380ed70e26ae17337dc7f2db1c51f9981e25254b970fddaf75b
-
SSDEEP
98304:JxylZpEqZcrEAz3Cf+0rFVXxSyFzN0OpuLV+fN9c:SZCrdzyfjX4a50V+V9c
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-