General
-
Target
sus.zip
-
Size
1KB
-
Sample
230510-3ltsaaag66
-
MD5
51059060480c22693c8ff2332079a3ec
-
SHA1
ed5fe31b930e20c13b5115b01b08684a32a29fac
-
SHA256
5638ffc3e6d75054d693270d66859e040ada9563aa90ccd6e2a0f3a0e67b8c0b
-
SHA512
bf8192b9e6f55baaba22c88d820c284920668c9449363c8c62a1831a143eeeb55eb5d386e8ace3de797723ba139db9fe4cd7e13158d5025f93ba539f4c37cc87
Static task
static1
Behavioral task
behavioral1
Sample
sus.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sus.zip
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
cheat
194.87.151.202:9578
Extracted
systembc
148.251.236.201:443
Extracted
redline
06.05 youtube
23.226.129.17:20619
-
auth_value
21645ccdf8187508e3b133b1d80a162e
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
sus.zip
-
Size
1KB
-
MD5
51059060480c22693c8ff2332079a3ec
-
SHA1
ed5fe31b930e20c13b5115b01b08684a32a29fac
-
SHA256
5638ffc3e6d75054d693270d66859e040ada9563aa90ccd6e2a0f3a0e67b8c0b
-
SHA512
bf8192b9e6f55baaba22c88d820c284920668c9449363c8c62a1831a143eeeb55eb5d386e8ace3de797723ba139db9fe4cd7e13158d5025f93ba539f4c37cc87
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-