General
-
Target
88ce28ff68c1aed67d67789260dc51fdc5ad0e7fd69c27d0f60db5214e013b24.exe
-
Size
964KB
-
Sample
250318-gj64yavzet
-
MD5
14d111eba3c9ee5e36549ebad0360dbe
-
SHA1
ee236f96bf998ec27f3e83db02af8df5ac0e3631
-
SHA256
88ce28ff68c1aed67d67789260dc51fdc5ad0e7fd69c27d0f60db5214e013b24
-
SHA512
d30edadffc4de7d3bb95753ef00d344c56db47593afbdea79cbc96f41caa65322c6b1997047cbdb764933e9151a7195478f06cb981aa04bdde66e8e7070eaae9
-
SSDEEP
24576:bxLsMs8WdZ78l98ecfHOGABIe8kneSuRWu:Jsldmv89fHOz8OwWu
Static task
static1
Behavioral task
behavioral1
Sample
88ce28ff68c1aed67d67789260dc51fdc5ad0e7fd69c27d0f60db5214e013b24.exe
Resource
win7-20241023-en
Malware Config
Extracted
redline
cheat
45.137.22.150:55615
Targets
-
-
Target
88ce28ff68c1aed67d67789260dc51fdc5ad0e7fd69c27d0f60db5214e013b24.exe
-
Size
964KB
-
MD5
14d111eba3c9ee5e36549ebad0360dbe
-
SHA1
ee236f96bf998ec27f3e83db02af8df5ac0e3631
-
SHA256
88ce28ff68c1aed67d67789260dc51fdc5ad0e7fd69c27d0f60db5214e013b24
-
SHA512
d30edadffc4de7d3bb95753ef00d344c56db47593afbdea79cbc96f41caa65322c6b1997047cbdb764933e9151a7195478f06cb981aa04bdde66e8e7070eaae9
-
SSDEEP
24576:bxLsMs8WdZ78l98ecfHOGABIe8kneSuRWu:Jsldmv89fHOz8OwWu
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-