General
-
Target
32c3b9ac52bb171a1ef3621ac646aefb43cc9619125bf504bf249c2f1167e751
-
Size
608KB
-
Sample
250213-dt777ssqct
-
MD5
83900338ff3c883cf29f709612011439
-
SHA1
ee1b929bad5add7a53eb99cb44e4207d44f2b432
-
SHA256
32c3b9ac52bb171a1ef3621ac646aefb43cc9619125bf504bf249c2f1167e751
-
SHA512
0dea833633d32f870ba2041fbd05798dce76cdbdccd9fc59119c4c2491bdaf0aa584588c7140179523a6589a8329e5a197aced124436adba07f4be943a76a8ec
-
SSDEEP
12288:9yvRY1piOhgXj2oC1Qq8OwzdKB4sQAr8oDnsrJPybpJJiVUXTqb:QvRShhgzvCZ8OUrsQa8MnOyHcVUjqb
Static task
static1
Behavioral task
behavioral1
Sample
SAMPLE & DRAWING.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
45.137.22.234:55615
Targets
-
-
Target
SAMPLE & DRAWING.exe
-
Size
673KB
-
MD5
eac8d64bfbc083aa74bcf866c9dea7ac
-
SHA1
35b212e526376571b475664237a0d9b55810ad9e
-
SHA256
5de17a5a924075eff342030dc58fab7443edb2a68c90749f674a5465552d1978
-
SHA512
ac91135c1244ee8d4db77a04b9e2544eb1b3511935480881d3b91e751723d7f46308df579831d8651fc8d59938d3c85b8eb5cb421c2beb8cf95700e99c9384b4
-
SSDEEP
12288:FcvVY6ao4/7xefpM4gwzzsCCB4sQqF8oDfArJPobxrJ+AS74kP:6vVJutehqUzzsQE8MfiotMA0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2