General
-
Target
3b45cb925d25aaf9d3019c4ca1efc6fae72edf501580deb90fb176240f554acc
-
Size
493KB
-
Sample
250409-jcf1aattdt
-
MD5
2e579dfc841ab313a1e87bab08877fa0
-
SHA1
82a69f4b47ff01e37c1e2bc1428529f5dd53ef32
-
SHA256
3b45cb925d25aaf9d3019c4ca1efc6fae72edf501580deb90fb176240f554acc
-
SHA512
48243241456d1d1dc09a713ef9e3f464549849b84518ba3de355920ea90d992afdc5fe930e7a0df17e170d1fa0c805aef1962139d529091c38001025f5d71e85
-
SSDEEP
12288:YS9zEsdp2J1eJwDURAqRQp10695Mrq/gDRJS6AXFonyEAaScpwCnCTy:b9zESyYODUWqE55Mrqw2mJzSsN
Static task
static1
Malware Config
Extracted
redline
vex4you
209.38.151.4:55123
Targets
-
-
Target
RFQ-ELITE INDUSTRIAL MARINE PROJECT.exe
-
Size
613KB
-
MD5
0f358d948a39fa160f08b2a8e786da30
-
SHA1
50f44f050d5290917fdddd6460012380ceab1af4
-
SHA256
b7da8e57884104384c9b20ff8fe96c7d2447c28641f48f9250eeb0e70d848dcd
-
SHA512
baffc94524e6bcc33d9eed1005531a0d3ea5a06307f32cb923f2421c15ba95919131a215d715b9a15fd6a9ee65a670f1d2067fc5e354e4f7cf07fbd322492e8f
-
SSDEEP
12288:yX6okzyo6/8eWBThtKIwBD5fKC/h8751sel5BUSOd8NrR:yX6dIuJhtrwd1KC/h8/sel5BUvd+R
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-