General
-
Target
00a32a9ea8cf1dcb16567d39f347f1a3.exe
-
Size
675KB
-
Sample
250214-ts9bwatpgx
-
MD5
00a32a9ea8cf1dcb16567d39f347f1a3
-
SHA1
8256dfe45b2b4385d523633d9287b354b29aa4e5
-
SHA256
6cf3be19b0ad012e085aa4a19e2b60ce8072c09edd53736ca36d886abddd5ff6
-
SHA512
c7da422d5a66efe1822793f84fd0f727c9962dc1d692a50bfa830e6f34464f9c458f5debcd0336beb105f1a2b126dd64ef272b498e252987f0936796cdf27123
-
SSDEEP
12288:XoaovT2lPK7JaJM25F8PUCMQgbYAUQPHbAp2RyExqBT+Ta7mCxLE+QUQtsaZrMvw:G2BKIG25PbY9I18EuJ7
Static task
static1
Behavioral task
behavioral1
Sample
00a32a9ea8cf1dcb16567d39f347f1a3.exe
Resource
win7-20250207-en
Malware Config
Extracted
redline
cheat
45.137.22.165:55615
Targets
-
-
Target
00a32a9ea8cf1dcb16567d39f347f1a3.exe
-
Size
675KB
-
MD5
00a32a9ea8cf1dcb16567d39f347f1a3
-
SHA1
8256dfe45b2b4385d523633d9287b354b29aa4e5
-
SHA256
6cf3be19b0ad012e085aa4a19e2b60ce8072c09edd53736ca36d886abddd5ff6
-
SHA512
c7da422d5a66efe1822793f84fd0f727c9962dc1d692a50bfa830e6f34464f9c458f5debcd0336beb105f1a2b126dd64ef272b498e252987f0936796cdf27123
-
SSDEEP
12288:XoaovT2lPK7JaJM25F8PUCMQgbYAUQPHbAp2RyExqBT+Ta7mCxLE+QUQtsaZrMvw:G2BKIG25PbY9I18EuJ7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2