General
-
Target
014b2ca1f9e6ad821c1a384b9d384f31.exe
-
Size
998KB
-
Sample
250222-ve9wxswky8
-
MD5
014b2ca1f9e6ad821c1a384b9d384f31
-
SHA1
fca0ae3b21d561c530c5a52af19150100b2e0a6c
-
SHA256
72ef04b633c90ce77442104498f7b667e6bcf0deee9c837beb54d8d3bb3503e0
-
SHA512
26cc6baa0654d7294df5a25f67d36d66ac7f918de9e3b92476170182ba64d9a5194a710aff90b642f0c0c7d8b1f9e0030814014f1372c85016bbcfeb18d97dfe
-
SSDEEP
12288:v6jb6G5xtiI95yS+c57boNna6xg20t4ham0gX:v05xt9E3nakiW
Static task
static1
Behavioral task
behavioral1
Sample
014b2ca1f9e6ad821c1a384b9d384f31.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
185.222.58.250:55615
Targets
-
-
Target
014b2ca1f9e6ad821c1a384b9d384f31.exe
-
Size
998KB
-
MD5
014b2ca1f9e6ad821c1a384b9d384f31
-
SHA1
fca0ae3b21d561c530c5a52af19150100b2e0a6c
-
SHA256
72ef04b633c90ce77442104498f7b667e6bcf0deee9c837beb54d8d3bb3503e0
-
SHA512
26cc6baa0654d7294df5a25f67d36d66ac7f918de9e3b92476170182ba64d9a5194a710aff90b642f0c0c7d8b1f9e0030814014f1372c85016bbcfeb18d97dfe
-
SSDEEP
12288:v6jb6G5xtiI95yS+c57boNna6xg20t4ham0gX:v05xt9E3nakiW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-