General
-
Target
2960-89-0x00000000007C0000-0x0000000000C3E000-memory.dmp
-
Size
4.5MB
-
Sample
250211-wxap8avqgq
-
MD5
f17ec7dc413e5ce5121e2dc577dee043
-
SHA1
577fb182a873e473ee806cea3d648d199399d02d
-
SHA256
b8093bd423fcbcedb4a261b849632e23158312596ab5f4aec2abd076bdb98618
-
SHA512
bea2da48973032d7e07a4ccedda3d4a0e7ddd78350ab2a3604c8579ec9798bb6544cfe11048f3dca6344bde6ccf771e4f236c31fa2205841a92ade93bf3f1ccb
-
SSDEEP
98304:n585R1k5X1BvmS2DibAqMY+FT7RzXZWBRCl:npNxsXT7biC
Behavioral task
behavioral1
Sample
2960-89-0x00000000007C0000-0x0000000000C3E000-memory.exe
Resource
win7-20240729-en
Malware Config
Extracted
redline
cheat
103.214.142.152:26264
Targets
-
-
Target
2960-89-0x00000000007C0000-0x0000000000C3E000-memory.dmp
-
Size
4.5MB
-
MD5
f17ec7dc413e5ce5121e2dc577dee043
-
SHA1
577fb182a873e473ee806cea3d648d199399d02d
-
SHA256
b8093bd423fcbcedb4a261b849632e23158312596ab5f4aec2abd076bdb98618
-
SHA512
bea2da48973032d7e07a4ccedda3d4a0e7ddd78350ab2a3604c8579ec9798bb6544cfe11048f3dca6344bde6ccf771e4f236c31fa2205841a92ade93bf3f1ccb
-
SSDEEP
98304:n585R1k5X1BvmS2DibAqMY+FT7RzXZWBRCl:npNxsXT7biC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-