General
-
Target
0a7dd9658f24dd15b3818fc0ed2c7f5048ad6dae6ff7b48a05fc37470b93bc2d.bin
-
Size
770KB
-
Sample
230511-w7fn8ahb59
-
MD5
cba8088c3c40902c240988c77e57b25b
-
SHA1
ff12448e2d5ed470c8c05e84677cb23dc36e013a
-
SHA256
0a7dd9658f24dd15b3818fc0ed2c7f5048ad6dae6ff7b48a05fc37470b93bc2d
-
SHA512
b53b23f74e59ed2777bdebba39bc33981c0829e122a8c25eea3446b2bf7d8e2dba18195f0cd992e0e33b456fb85e23f94080cb76138311f888859e51b7e58f0a
-
SSDEEP
12288:xMray90GmRsZb8LjxaqDMtFCCl9HmjsJ/BoAPpnDCm/xs5rsQtIVTKgAgbhhyVq:byWsgjleZtpo2b/0rBqTKgAgbhYq
Static task
static1
Behavioral task
behavioral1
Sample
0a7dd9658f24dd15b3818fc0ed2c7f5048ad6dae6ff7b48a05fc37470b93bc2d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0a7dd9658f24dd15b3818fc0ed2c7f5048ad6dae6ff7b48a05fc37470b93bc2d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
0a7dd9658f24dd15b3818fc0ed2c7f5048ad6dae6ff7b48a05fc37470b93bc2d.bin
-
Size
770KB
-
MD5
cba8088c3c40902c240988c77e57b25b
-
SHA1
ff12448e2d5ed470c8c05e84677cb23dc36e013a
-
SHA256
0a7dd9658f24dd15b3818fc0ed2c7f5048ad6dae6ff7b48a05fc37470b93bc2d
-
SHA512
b53b23f74e59ed2777bdebba39bc33981c0829e122a8c25eea3446b2bf7d8e2dba18195f0cd992e0e33b456fb85e23f94080cb76138311f888859e51b7e58f0a
-
SSDEEP
12288:xMray90GmRsZb8LjxaqDMtFCCl9HmjsJ/BoAPpnDCm/xs5rsQtIVTKgAgbhhyVq:byWsgjleZtpo2b/0rBqTKgAgbhYq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-