General
-
Target
2cc31e67f6448825be0ddc678165fe338ffd23f9581797f4ce1272dfe5dea297
-
Size
461KB
-
Sample
250410-gahd8asmx4
-
MD5
b2b1823a6a8aa7b6bce1b607b522c66f
-
SHA1
d2fccd82884b0b0e3e2df5d752dfc8495413a25c
-
SHA256
2cc31e67f6448825be0ddc678165fe338ffd23f9581797f4ce1272dfe5dea297
-
SHA512
568973efb57bf3e11e2b76871a60294b5b636385ff23caf6e7dbe40856a55b105cb0650c810098f892a764bdf253bf28a6493a4b92d9078a26cb9c2561ea94ff
-
SSDEEP
12288:95obI34UhdqAdhPkb5uR2urDnGAn6QQxyRME8vlpd:Ti3ULfPkb58XGwWW8Z
Static task
static1
Malware Config
Extracted
redline
vex4you
209.38.151.4:55123
Targets
-
-
Target
PO#US003830.PDF..............exe
-
Size
512KB
-
MD5
2541997a6cb4f57e957e02be55ff3742
-
SHA1
605a47ea31da455b0e31c1f088f87c4b8a83caa6
-
SHA256
a2735005d85c2e5362b214f1a32593945a8c682b541a2f459823fb0669df62ae
-
SHA512
ccba04c4e3b8f6159629425f228a930e549d3c6274cc44ddef5c9932fa48e67fab388adbd8c80694b7a211f90c6f28c128d73a3d569c1977da78e6b16e8b7cb8
-
SSDEEP
12288:4VK/e5E/p/wXI19f/sAGDH+Yw77SnEv17/LRpYzjsuFo:w5af+H+B7SnY17YzjsuFo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-