General
-
Target
2025-04-02_63b60ae67da8b10796b0c91d2f9a2de2_agent-tesla_formbook_hiddentear_xloader
-
Size
679KB
-
Sample
250402-evwq8s1vfw
-
MD5
63b60ae67da8b10796b0c91d2f9a2de2
-
SHA1
9e15f3db157bc8c57dfd4442ffbcb57b17a8ffef
-
SHA256
b5e4582459f04b0cad1536690f96bdb740d487788bc831f18fc8eecf14261e92
-
SHA512
ecba888bd0dd4bf53a93a0db5d8173a18a8c1e1b8b4d2de36faf2ed578e9781b6f94336bc705c6d3435cb5470c12c4abfa0f03df4d8679a7f73e94d52cef0a25
-
SSDEEP
12288:QvtMlZdojk17xdpckAsxK4RJV/JIigbyHPlAxfdAA:st34nbckw4p/JIigbuaxFA
Static task
static1
Malware Config
Extracted
redline
cheat
23.105.161.229:21522
Targets
-
-
Target
2025-04-02_63b60ae67da8b10796b0c91d2f9a2de2_agent-tesla_formbook_hiddentear_xloader
-
Size
679KB
-
MD5
63b60ae67da8b10796b0c91d2f9a2de2
-
SHA1
9e15f3db157bc8c57dfd4442ffbcb57b17a8ffef
-
SHA256
b5e4582459f04b0cad1536690f96bdb740d487788bc831f18fc8eecf14261e92
-
SHA512
ecba888bd0dd4bf53a93a0db5d8173a18a8c1e1b8b4d2de36faf2ed578e9781b6f94336bc705c6d3435cb5470c12c4abfa0f03df4d8679a7f73e94d52cef0a25
-
SSDEEP
12288:QvtMlZdojk17xdpckAsxK4RJV/JIigbyHPlAxfdAA:st34nbckw4p/JIigbuaxFA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-