General
-
Target
dc9f822b2fa1f558d40206052e6687bfaf1f277d8b7355f687289860cdedec45
-
Size
492KB
-
Sample
250331-lbfn8swvdy
-
MD5
c929640b0e7a2874f73fe565aa65dc2e
-
SHA1
7dd1e7802aaa73808e6929281ef758bc1b4917c9
-
SHA256
dc9f822b2fa1f558d40206052e6687bfaf1f277d8b7355f687289860cdedec45
-
SHA512
e1edbd1277de0229bffa364107a4e50127ed65c342663ab0cdc28f2760d44b3e370d6a264dbeb54a7f7f072f2c239aa436fc3d0d6841acf10631378be7d5f799
-
SSDEEP
6144:tiNMmZK9n9qvkXMupslTWk+3P9ATlp3VnkAa1nbeCGh+SoXPFVhwalx1S6uS7N+R:tuMkmQvkfslKk4olp3dkbeLh+r1Eiydf
Static task
static1
Malware Config
Extracted
redline
cheat
45.137.22.105:55615
Targets
-
-
Target
SAMPLE PICTURES.exe
-
Size
585KB
-
MD5
f62a95ab467661683d70271eecd84dfc
-
SHA1
9a5a922ccbb24a62e9bf56445febd15b5c8c86d7
-
SHA256
3f83cef30d4248da1845b186eecd318462279200f8f3aa99a272ae8b41f7836c
-
SHA512
2959c899b2f28858cd3d7841c960797d6f0035df1d166574c2f7e26012bf01151073c9115082595e5f58bb1e313f22da8e9d75a2b9e6310895bac6549decf18e
-
SSDEEP
12288:/vtLlZ7sluuswl7q4lyze3h+141K4tAd:ntklzF5yyx+1oHKd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2