General
-
Target
300-1-0x0000000001120000-0x00000000015A6000-memory.dmp
-
Size
4.5MB
-
Sample
250209-py7ysa1mcq
-
MD5
15d77a5fbb4030e17b56b0994278de04
-
SHA1
92eb7d7eec5d74c43ee0956e2fcc1b52100923a7
-
SHA256
d1075bf2aeb7098703cc56a0070dd541c9cae9d11ed75108513e28629276b272
-
SHA512
57bc93a981ce1bf33e38adc08c00d3dfa15aa15ed23a7446898f4de9943d159cfdefbc2ac37832b3d43ccece01a7ab651869c70bb5241926c850251bea5b8022
-
SSDEEP
49152:563M9YGvMXI4/I10pmaE6NtNprwQEtxY1nKSqdusgOXkAawPhAasGo:563M9TvMXzQcmCtNpSqKRzP0bwPhAZ3
Behavioral task
behavioral1
Sample
300-1-0x0000000001120000-0x00000000015A6000-memory.exe
Resource
win7-20241010-en
Malware Config
Extracted
redline
cheat
103.84.89.222:33791
Targets
-
-
Target
300-1-0x0000000001120000-0x00000000015A6000-memory.dmp
-
Size
4.5MB
-
MD5
15d77a5fbb4030e17b56b0994278de04
-
SHA1
92eb7d7eec5d74c43ee0956e2fcc1b52100923a7
-
SHA256
d1075bf2aeb7098703cc56a0070dd541c9cae9d11ed75108513e28629276b272
-
SHA512
57bc93a981ce1bf33e38adc08c00d3dfa15aa15ed23a7446898f4de9943d159cfdefbc2ac37832b3d43ccece01a7ab651869c70bb5241926c850251bea5b8022
-
SSDEEP
49152:563M9YGvMXI4/I10pmaE6NtNprwQEtxY1nKSqdusgOXkAawPhAasGo:563M9TvMXzQcmCtNpSqKRzP0bwPhAZ3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2