General
-
Target
f16d8d3ce283f9b2711f8b513f7d4a82ba96ec628e8b41e7c0ac0fdd2ba2585f
-
Size
548KB
-
Sample
250312-gd7taazjt8
-
MD5
5f76092ded8e01d60960943b0886ef53
-
SHA1
7b0a53288a8f308569b704ddcc458711da0ddc6f
-
SHA256
f16d8d3ce283f9b2711f8b513f7d4a82ba96ec628e8b41e7c0ac0fdd2ba2585f
-
SHA512
e133b97a4668dc6951f3f6b902c5c1d836131d978908aa3eca496164cecf613006387059830e162bbec33626db9318fcba2c77e1c958c6ce9fd61e4777f0d933
-
SSDEEP
12288:gCMN1VyINMJ0EbPxGP8WOKPBsrubUlmmVY2iSn0n9Y9Ba7AMdX:TO1VAIJPBcubpmyTn98BF8
Static task
static1
Behavioral task
behavioral1
Sample
f16d8d3ce283f9b2711f8b513f7d4a82ba96ec628e8b41e7c0ac0fdd2ba2585f.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
45.137.22.227:55615
Targets
-
-
Target
f16d8d3ce283f9b2711f8b513f7d4a82ba96ec628e8b41e7c0ac0fdd2ba2585f
-
Size
548KB
-
MD5
5f76092ded8e01d60960943b0886ef53
-
SHA1
7b0a53288a8f308569b704ddcc458711da0ddc6f
-
SHA256
f16d8d3ce283f9b2711f8b513f7d4a82ba96ec628e8b41e7c0ac0fdd2ba2585f
-
SHA512
e133b97a4668dc6951f3f6b902c5c1d836131d978908aa3eca496164cecf613006387059830e162bbec33626db9318fcba2c77e1c958c6ce9fd61e4777f0d933
-
SSDEEP
12288:gCMN1VyINMJ0EbPxGP8WOKPBsrubUlmmVY2iSn0n9Y9Ba7AMdX:TO1VAIJPBcubpmyTn98BF8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-