General
-
Target
9ac72c52d01edd78f0012ecdd15ca8c839830c68b77681325dd11cda309eda85.exe
-
Size
592KB
-
Sample
250308-nzhvlswxat
-
MD5
b92fbfb1456ffbbda1a668cba58533a7
-
SHA1
75bb0aebf4e0f239c3abb7604c1485a74b33e0c3
-
SHA256
9ac72c52d01edd78f0012ecdd15ca8c839830c68b77681325dd11cda309eda85
-
SHA512
71a5e7ca9df812a1fceede8218addedc2a8fce4bf92e6bb5f2ce5ae27aaf3c7825833bdc0b5b38453c4b79c041fff33ebbcda090c6664d25ad569fdb3fa2d9dc
-
SSDEEP
12288:z/gp50g7ZeK50g73tl4dkKkpGrMY9UN0f1NSBqkhHo5zNteTgTJ74xWw:Up5F7AK5F79JpXWE+pmYygT+w
Static task
static1
Behavioral task
behavioral1
Sample
9ac72c52d01edd78f0012ecdd15ca8c839830c68b77681325dd11cda309eda85.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
45.137.22.249:55615
Targets
-
-
Target
9ac72c52d01edd78f0012ecdd15ca8c839830c68b77681325dd11cda309eda85.exe
-
Size
592KB
-
MD5
b92fbfb1456ffbbda1a668cba58533a7
-
SHA1
75bb0aebf4e0f239c3abb7604c1485a74b33e0c3
-
SHA256
9ac72c52d01edd78f0012ecdd15ca8c839830c68b77681325dd11cda309eda85
-
SHA512
71a5e7ca9df812a1fceede8218addedc2a8fce4bf92e6bb5f2ce5ae27aaf3c7825833bdc0b5b38453c4b79c041fff33ebbcda090c6664d25ad569fdb3fa2d9dc
-
SSDEEP
12288:z/gp50g7ZeK50g73tl4dkKkpGrMY9UN0f1NSBqkhHo5zNteTgTJ74xWw:Up5F7AK5F79JpXWE+pmYygT+w
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-