General
-
Target
5344-1318-0x0000000000CB0000-0x0000000001128000-memory.dmp
-
Size
4.5MB
-
Sample
250224-rmlmhswq13
-
MD5
622207079e4d659a10e6952366480905
-
SHA1
0d535b551f9e70e0bb14c45c5beda4477b67083c
-
SHA256
747b8fcca155efaf4925f59e4be462f9b6b4d4ff83919f62b83a124d03a5047e
-
SHA512
7eddbc1fe2a8e40984b839fa57cab280939ba95d8e1cb35d6402b85962ae6f9e7babdf360402a19cfefb2e57147740c403d8fc914ed1b1b6d6a281de5a0f3ee5
-
SSDEEP
49152:bRrBR6Yu++6ZZEQwBT1t5vL46qUZJPqyhWzXRU6l3rIDUmGhgscIa:bRNR6Yu+zEQyj5vL4iFFIlcDUBa/I
Behavioral task
behavioral1
Sample
5344-1318-0x0000000000CB0000-0x0000000001128000-memory.exe
Resource
win7-20241010-en
Malware Config
Extracted
redline
cheat
103.84.89.222:33791
Targets
-
-
Target
5344-1318-0x0000000000CB0000-0x0000000001128000-memory.dmp
-
Size
4.5MB
-
MD5
622207079e4d659a10e6952366480905
-
SHA1
0d535b551f9e70e0bb14c45c5beda4477b67083c
-
SHA256
747b8fcca155efaf4925f59e4be462f9b6b4d4ff83919f62b83a124d03a5047e
-
SHA512
7eddbc1fe2a8e40984b839fa57cab280939ba95d8e1cb35d6402b85962ae6f9e7babdf360402a19cfefb2e57147740c403d8fc914ed1b1b6d6a281de5a0f3ee5
-
SSDEEP
49152:bRrBR6Yu++6ZZEQwBT1t5vL46qUZJPqyhWzXRU6l3rIDUmGhgscIa:bRNR6Yu+zEQyj5vL4iFFIlcDUBa/I
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-