General
-
Target
2d97f9172f4ca5cc797189f727b04f4766cbf7141ea10ae32a76cd7fe3170102
-
Size
693KB
-
Sample
250220-ced55stqdp
-
MD5
374f8da083ce9e4a1ae01b2f53b89d3a
-
SHA1
d9d8957a0e8449bfd57ea5d25797faf30a582920
-
SHA256
2d97f9172f4ca5cc797189f727b04f4766cbf7141ea10ae32a76cd7fe3170102
-
SHA512
8e970420e75fe7f96759b4b749ea4e7d5c0043456823b2acb602ee00bd6b06227abc88577dac41c77b7f1e3e1513be7d02c2019944d405c9a59f29570c767d93
-
SSDEEP
12288:1Wi++I5SD94HIpZJRMKSuCs4ctQlCSLsQfIJDt9afnben:DnqHIkGFtQlCSL9wJDnavben
Static task
static1
Behavioral task
behavioral1
Sample
Pictures.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
185.222.58.44:55615
Targets
-
-
Target
Pictures.exe
-
Size
877KB
-
MD5
5fe61dbd19271b37f733be749530031f
-
SHA1
51e489aa4b73aac7c6116a3de0ad1e03fd0716c8
-
SHA256
ab82349ff6e283c364a3188708ac4d581782d072a9e9c04c8381fbd1bec4cfea
-
SHA512
dfa10f1e1620c9861ca6bb9b7f3b1aa82e3f41457b52f2d5273d1e4ce07df28ec429f4a1dc7b3c61892d9a404ea58b25926aaf0d58966d167180d615c908707e
-
SSDEEP
12288:yZFKLCVORpMn++jGNXzDn47MpFFjMKSucsiYJOlAStqwfGJD192hsilrUSX59:sOdxW7MOGtJOlAStHeJDv2qqUe9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-