General
-
Target
272-1241-0x0000000000AF0000-0x0000000000F68000-memory.dmp
-
Size
4.5MB
-
Sample
250225-mcnxnstnv2
-
MD5
533e1d00f96ebfbfb7ccea36f2bfe52c
-
SHA1
1e8a44c8ec47050e88281527cb643c441476e85c
-
SHA256
8b9ebe1a847bef7905749427ebd9dcf758d03913a376f85babd7d7b65c4defa8
-
SHA512
cb48fd4e11cfe808a80e63f3e8d229410414f14bba4a5d783f1da1b2deacf88f1ff1602674baec6aed881f9de74d275f88990d629f116bdf6aa133cde621d82a
-
SSDEEP
49152:8RrBR6Yu++YJ1ot4B/3s4vEg6hUZJPqyhWzXRU6l3rIDUmGhgscIa:8RNR6Yu+Jot+c4vEgfFFIlcDUBa/I
Behavioral task
behavioral1
Sample
272-1241-0x0000000000AF0000-0x0000000000F68000-memory.exe
Resource
win7-20241023-en
Malware Config
Extracted
redline
cheat
103.84.89.222:33791
Targets
-
-
Target
272-1241-0x0000000000AF0000-0x0000000000F68000-memory.dmp
-
Size
4.5MB
-
MD5
533e1d00f96ebfbfb7ccea36f2bfe52c
-
SHA1
1e8a44c8ec47050e88281527cb643c441476e85c
-
SHA256
8b9ebe1a847bef7905749427ebd9dcf758d03913a376f85babd7d7b65c4defa8
-
SHA512
cb48fd4e11cfe808a80e63f3e8d229410414f14bba4a5d783f1da1b2deacf88f1ff1602674baec6aed881f9de74d275f88990d629f116bdf6aa133cde621d82a
-
SSDEEP
49152:8RrBR6Yu++YJ1ot4B/3s4vEg6hUZJPqyhWzXRU6l3rIDUmGhgscIa:8RNR6Yu+Jot+c4vEgfFFIlcDUBa/I
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-