General
-
Target
cf4fa9c480473d3419eb68f584d29de06dab99400ecfd2557100617ab7490c1d.bin
-
Size
770KB
-
Sample
230511-xbazjahg57
-
MD5
e72d04ac7f3eb386823ef8026f016241
-
SHA1
87649a54f19d6c07c0a2080e210ae6660bfd0c1d
-
SHA256
cf4fa9c480473d3419eb68f584d29de06dab99400ecfd2557100617ab7490c1d
-
SHA512
617abd222d522252f0390b4a91954472b06fa178218909f316d37c650c7418579a1507631a0bb28f9306d9d6356a663c6b69e7d58a01aa0c26ce9842e6746dbe
-
SSDEEP
12288:qMr0y901JMzTwi6XM8UEXcC0XGQwcWg4yGpVS14KVuRffceEPtnoKqRJLCFccK:ayUMzMi68znrt4VaVOfcftoKBK
Static task
static1
Behavioral task
behavioral1
Sample
cf4fa9c480473d3419eb68f584d29de06dab99400ecfd2557100617ab7490c1d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cf4fa9c480473d3419eb68f584d29de06dab99400ecfd2557100617ab7490c1d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
cf4fa9c480473d3419eb68f584d29de06dab99400ecfd2557100617ab7490c1d.bin
-
Size
770KB
-
MD5
e72d04ac7f3eb386823ef8026f016241
-
SHA1
87649a54f19d6c07c0a2080e210ae6660bfd0c1d
-
SHA256
cf4fa9c480473d3419eb68f584d29de06dab99400ecfd2557100617ab7490c1d
-
SHA512
617abd222d522252f0390b4a91954472b06fa178218909f316d37c650c7418579a1507631a0bb28f9306d9d6356a663c6b69e7d58a01aa0c26ce9842e6746dbe
-
SSDEEP
12288:qMr0y901JMzTwi6XM8UEXcC0XGQwcWg4yGpVS14KVuRffceEPtnoKqRJLCFccK:ayUMzMi68znrt4VaVOfcftoKBK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-