General
-
Target
d13bf4ae0a4687f55110ac4d2eb847a19f9e5fdf52579bbae4d706d8e28ccb5b.bin
-
Size
769KB
-
Sample
230511-xdjdpacb4y
-
MD5
d00d836df28d4949e2342b088f0c6510
-
SHA1
2c2b58563c7c6a130f83f9de445643daf39aa8c7
-
SHA256
d13bf4ae0a4687f55110ac4d2eb847a19f9e5fdf52579bbae4d706d8e28ccb5b
-
SHA512
811ed5afa1027eee7ff1c7847a7cf56e62be270612db64818dc00833de2f059214a837b3fce0edded5535dd73832954b38b56be94c168aac74600b3bfe743475
-
SSDEEP
12288:QMrwy90MujJFpRfMlYB7LCf2qgN2pu2ZoqUzjy4UsD/7:wyZsJvpMlYBX2g+qdzjdD/7
Static task
static1
Behavioral task
behavioral1
Sample
d13bf4ae0a4687f55110ac4d2eb847a19f9e5fdf52579bbae4d706d8e28ccb5b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d13bf4ae0a4687f55110ac4d2eb847a19f9e5fdf52579bbae4d706d8e28ccb5b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
d13bf4ae0a4687f55110ac4d2eb847a19f9e5fdf52579bbae4d706d8e28ccb5b.bin
-
Size
769KB
-
MD5
d00d836df28d4949e2342b088f0c6510
-
SHA1
2c2b58563c7c6a130f83f9de445643daf39aa8c7
-
SHA256
d13bf4ae0a4687f55110ac4d2eb847a19f9e5fdf52579bbae4d706d8e28ccb5b
-
SHA512
811ed5afa1027eee7ff1c7847a7cf56e62be270612db64818dc00833de2f059214a837b3fce0edded5535dd73832954b38b56be94c168aac74600b3bfe743475
-
SSDEEP
12288:QMrwy90MujJFpRfMlYB7LCf2qgN2pu2ZoqUzjy4UsD/7:wyZsJvpMlYBX2g+qdzjdD/7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-