General
-
Target
3d4ac6a8a5bfb0ea19fa8b368ca529f6afeba63b012fed95f99c3b5767a64cb2.bin
-
Size
770KB
-
Sample
230511-w8cc7ahc93
-
MD5
80cf505bc8f6c9567fc5e20b40868a8c
-
SHA1
8a0e522cb4ed931fba4f77e022ec6784f9eeb466
-
SHA256
3d4ac6a8a5bfb0ea19fa8b368ca529f6afeba63b012fed95f99c3b5767a64cb2
-
SHA512
e00677c20b9bd9545a60d0a7b63e133bbc12e95c62653c743f939da268e091355c19a59fa94e4fb8867e66e13c20a32f8d7066cc93e5d35b645102daa170679b
-
SSDEEP
12288:eMrey90MONRv+lfWrLChlQ6WKZPeHpqGOYnMH2jEqqH0zPTIZ:UyXuRkCQlxzPwQ2wnUz7IZ
Static task
static1
Behavioral task
behavioral1
Sample
3d4ac6a8a5bfb0ea19fa8b368ca529f6afeba63b012fed95f99c3b5767a64cb2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3d4ac6a8a5bfb0ea19fa8b368ca529f6afeba63b012fed95f99c3b5767a64cb2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
3d4ac6a8a5bfb0ea19fa8b368ca529f6afeba63b012fed95f99c3b5767a64cb2.bin
-
Size
770KB
-
MD5
80cf505bc8f6c9567fc5e20b40868a8c
-
SHA1
8a0e522cb4ed931fba4f77e022ec6784f9eeb466
-
SHA256
3d4ac6a8a5bfb0ea19fa8b368ca529f6afeba63b012fed95f99c3b5767a64cb2
-
SHA512
e00677c20b9bd9545a60d0a7b63e133bbc12e95c62653c743f939da268e091355c19a59fa94e4fb8867e66e13c20a32f8d7066cc93e5d35b645102daa170679b
-
SSDEEP
12288:eMrey90MONRv+lfWrLChlQ6WKZPeHpqGOYnMH2jEqqH0zPTIZ:UyXuRkCQlxzPwQ2wnUz7IZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-