General
-
Target
Redline.zip
-
Size
15.0MB
-
Sample
250207-wvew6asrbr
-
MD5
0f686985e788860aa57fd6c0394b31ac
-
SHA1
16a28142b90396bdec88b542856afc6a1d61de63
-
SHA256
c9ae7d325d8f08613bb8dff54d14591f4fbdd4f289509092b4fbb16c6b855d71
-
SHA512
42547b6a691c89ed58b8aa0bbd4e11b1c4411bd5291c10a8f575d5c2b8418fb2ed59f14a9838db3864468d751b396abbae0bf0389e407dc7c6e0013c47dfa036
-
SSDEEP
393216:Qo/GNMywpahzUACC3ubztEDnaYSH0DrmLMlvWqYiABvXpyVIqtR5R:Qo/GUCUAJ3uVmaiDr1Wln1ZyV/R5R
Behavioral task
behavioral1
Sample
Redline.zip
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral2
Sample
Redline.zip
Resource
win11-20241007-en
Malware Config
Extracted
redline
cheat
127.0.0.1:4483
Targets
-
-
Target
Redline.zip
-
Size
15.0MB
-
MD5
0f686985e788860aa57fd6c0394b31ac
-
SHA1
16a28142b90396bdec88b542856afc6a1d61de63
-
SHA256
c9ae7d325d8f08613bb8dff54d14591f4fbdd4f289509092b4fbb16c6b855d71
-
SHA512
42547b6a691c89ed58b8aa0bbd4e11b1c4411bd5291c10a8f575d5c2b8418fb2ed59f14a9838db3864468d751b396abbae0bf0389e407dc7c6e0013c47dfa036
-
SSDEEP
393216:Qo/GNMywpahzUACC3ubztEDnaYSH0DrmLMlvWqYiABvXpyVIqtR5R:Qo/GUCUAJ3uVmaiDr1Wln1ZyV/R5R
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2