General
-
Target
52e1bb883b8e09f753159f4a6312b12590c53aef9cea2d608c51fc863085be90
-
Size
465KB
-
Sample
250408-jkbers1mz2
-
MD5
303378dda5e2502bb8bf4dd1bf47fcf4
-
SHA1
f9fd5cf362f697284012054fdfb75e2e24099be0
-
SHA256
52e1bb883b8e09f753159f4a6312b12590c53aef9cea2d608c51fc863085be90
-
SHA512
1ea175cadb21de789a8baa1a30c74151c0295a76b604526a23d9088c88731de5b99861d2a81e678fa7dc41b9c6baa395b6674303ba2197ac08db822424253019
-
SSDEEP
12288:vCaoEZyEfrY5aHf0V/tvmVaKF/4hv9tfjkmA:qgBHf0VFeVa6/4hv9tfImA
Static task
static1
Malware Config
Extracted
redline
cheat
45.137.22.105:55615
Targets
-
-
Target
SAMPLES DRAWING & PICTURS.exe
-
Size
520KB
-
MD5
3e0b15798b6c27cb538668aad787cca8
-
SHA1
35cbef46b336f9f063d4ad49ff98e10e346b2cba
-
SHA256
f5d5b215b155bf76191567f503124575c35d80129aad17ead629674e6d618114
-
SHA512
7782bb5fd6aa9e339fb208d1ad3fe90fec4a74201b86b4c93c29a86306b5c9699963e543e66bfb39b672b247e51a797ef1bf8d65cbdfc937064c383a2901d4fd
-
SSDEEP
12288:3jLORFkieV5S+ErhY56Hf0f/tTj0w5IFn4TvtsfO0d1U:3vBDY1Hf0fFP0yUn4TvtsW07
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-