General
-
Target
2025-03-18_7613975c38818b3e713fcc952008022d_agent-tesla_hiddentear_xloader
-
Size
683KB
-
Sample
250318-b41j1astbs
-
MD5
7613975c38818b3e713fcc952008022d
-
SHA1
c2bc285e977ad4321005c922fe5b839ece0f9ff7
-
SHA256
15b537f30441cecdf80a786745e07325182b608bf25ce31c8b385f38f4998c8a
-
SHA512
195248a6a1918cd7d76edba3cb94e8fa9c972c3f8035778da1dbe7d9c893126fe66c77039e281f3a7598758558e1a5cbed73076271f869ee78799ea3b0c81235
-
SSDEEP
12288:AQELOiPyAuxP18MbaKsorV3KRgjfN6FD12J+jg8U2dAA:XiP8jaIIufNUp2gCEA
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-18_7613975c38818b3e713fcc952008022d_agent-tesla_hiddentear_xloader.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
38.18.229.195:42340
Targets
-
-
Target
2025-03-18_7613975c38818b3e713fcc952008022d_agent-tesla_hiddentear_xloader
-
Size
683KB
-
MD5
7613975c38818b3e713fcc952008022d
-
SHA1
c2bc285e977ad4321005c922fe5b839ece0f9ff7
-
SHA256
15b537f30441cecdf80a786745e07325182b608bf25ce31c8b385f38f4998c8a
-
SHA512
195248a6a1918cd7d76edba3cb94e8fa9c972c3f8035778da1dbe7d9c893126fe66c77039e281f3a7598758558e1a5cbed73076271f869ee78799ea3b0c81235
-
SSDEEP
12288:AQELOiPyAuxP18MbaKsorV3KRgjfN6FD12J+jg8U2dAA:XiP8jaIIufNUp2gCEA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-