General
-
Target
446d6030adeb99441e4d80536b1c19bce3c779987f534ba967c771612c94abaf
-
Size
492KB
-
Sample
250224-fbnrys1kcl
-
MD5
42a3958f54cf2d91d0d2d7a28134dc8d
-
SHA1
390126338bd3416587dfcdc31a18a8917e4a1ffe
-
SHA256
446d6030adeb99441e4d80536b1c19bce3c779987f534ba967c771612c94abaf
-
SHA512
7076d2f7c6e0f62283c1996f646d537a545e0a723032c15146a06bad197eac25673e8f4eb3231b98cbd5d0973ce183d9e7fdafc2fad2789d37eb1dc5d00d43f8
-
SSDEEP
12288:4xmam+P6G/LDYxre5ywNlzPMLGLyaTgVuGp5NreCaOlHr:26MLDDhzEKLyaTgVnpXlHr
Static task
static1
Behavioral task
behavioral1
Sample
SPECIFICATION & SAMPLES.exe
Resource
win7-20241010-en
Malware Config
Extracted
redline
cheat
185.222.58.229:55615
Targets
-
-
Target
SPECIFICATION & SAMPLES.exe
-
Size
583KB
-
MD5
935639e0a777039f7920146166a39e8b
-
SHA1
720a8a07d7645c1871a850de4887f593fe7384a1
-
SHA256
03bdfee3da39b03b4dfb1df74f0873d6d00e34c560505bd7b120f632404d5a1c
-
SHA512
03e6bab45395407aff4ac325f25ff7503a5e1a62a071cdc689bebd398a1c33fb0cfbbee2e8fc30c5ff6523e5082f7194ae474f168b8b2c92d5e3b380c054e5bc
-
SSDEEP
12288:2Mr8Il6dYeXY/e1fG/LLYZne5EU/zqAn8NvGXyaPelSGBXdOSgOuNPT:2MrbMR9MLLdtQNvMyaPelDBXYzT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-