General
-
Target
b84f81bdbb79467cb27775d0cc99795eaec00e65096085cce684e64db14d6f09
-
Size
462KB
-
Sample
250320-jtqk2s1pw9
-
MD5
8a3bcff50b2682db9c977f2245ec4dc6
-
SHA1
22cff7178c5fa26bd2a5d3ed726aaec639270082
-
SHA256
b84f81bdbb79467cb27775d0cc99795eaec00e65096085cce684e64db14d6f09
-
SHA512
c6bdd861b908258470abb9c69d7e4924d323b2ed21e47caafb35f0fc080e570bba72787bc8fa8f8dcaae7232fef8d71a7cf9f05dcfdff74c34331abbf08c8fe7
-
SSDEEP
12288:yFVUK44LkmkEc/lMPz7M1RPN0S4sIpHvRigEpRuDxq2g6:yFn3kEQlMPzg1Rl07sIpHv0pRda
Static task
static1
Behavioral task
behavioral1
Sample
SAMPLE PICTURES.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
cheat
45.137.22.178:55615
Targets
-
-
Target
SAMPLE PICTURES.exe
-
Size
499KB
-
MD5
d855d7927afb8a221096e14b494e3421
-
SHA1
97b970f4a39ed5418c6057198ceb5c4f5b151ca2
-
SHA256
33540347f9022510c4e5cbf6c08ef2ab908b2f6812bf6e2ef2cdbc4ee43f87d3
-
SHA512
60486b8563e140cf8073e702daf1fb81b145d7c6ae5e941ef2650db9420653cc70064e21a263215156c35ac9cf1b560ae57441437e9eb23aa0614dcdc0c962e6
-
SSDEEP
12288:d7XLCsp389W4y4LkqkEcplOPznM1Pvd0oO0SpQ9:xXLCsBn4JkEAlOPzM1Pl010SpQ9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-