General
-
Target
2688-1129-0x00000000009C0000-0x0000000000E30000-memory.dmp
-
Size
4.4MB
-
Sample
250209-p3dkqs1qcy
-
MD5
59b30964d46a73adae97105eade4c7ee
-
SHA1
91113df7c319fdcb16b6a7290664116e01b75bd0
-
SHA256
b3a3f3e37c0ac408a471c978637f7f4d6582f17adf52a3e1710e98ca7f116f3a
-
SHA512
6bb7d34c63e8fb07fe90359b8b30f40b75b5e2b430f032628d768c9244f0dc6699e09c09e9a85041309b4bba7b8fd53bc7a98aef25164b727aff4d408d75e45a
-
SSDEEP
98304:xe4ABniUAvJjAEq9Q5bNiUJDqGrXsxQkLRJv5N89Rz:XAEqiRiUp6BRN5u99
Behavioral task
behavioral1
Sample
2688-1129-0x00000000009C0000-0x0000000000E30000-memory.exe
Resource
win7-20241010-en
Malware Config
Extracted
redline
cheat
103.84.89.222:33791
Targets
-
-
Target
2688-1129-0x00000000009C0000-0x0000000000E30000-memory.dmp
-
Size
4.4MB
-
MD5
59b30964d46a73adae97105eade4c7ee
-
SHA1
91113df7c319fdcb16b6a7290664116e01b75bd0
-
SHA256
b3a3f3e37c0ac408a471c978637f7f4d6582f17adf52a3e1710e98ca7f116f3a
-
SHA512
6bb7d34c63e8fb07fe90359b8b30f40b75b5e2b430f032628d768c9244f0dc6699e09c09e9a85041309b4bba7b8fd53bc7a98aef25164b727aff4d408d75e45a
-
SSDEEP
98304:xe4ABniUAvJjAEq9Q5bNiUJDqGrXsxQkLRJv5N89Rz:XAEqiRiUp6BRN5u99
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2