General
-
Target
bf6c2427cdd1ae62e0b1e9a55ebaefca4e5e7554021343884817652808cf959f
-
Size
1.5MB
-
Sample
230615-t135tsae65
-
MD5
b608a9ae94ba4680c0a4c3827d6ed5e9
-
SHA1
09c5fc351b7df7ce3911082df265d63076a70d00
-
SHA256
bf6c2427cdd1ae62e0b1e9a55ebaefca4e5e7554021343884817652808cf959f
-
SHA512
e679db781c0bc11f88633d9c795701ca10cfffd0e1faba96ca7ea149ecde863b5fa30d7ee62b0c1685a524feedf2e93b00637417d14c6b3b4cbb0d440f17aa11
-
SSDEEP
24576:4y22LmZQQXSE5VMsp0zYtKdTmRUQziSQluSOql7QexZBLVmkhAG:/2QmZQESE5/0WCTmRUNlzOqlDxJmr
Static task
static1
Behavioral task
behavioral1
Sample
bf6c2427cdd1ae62e0b1e9a55ebaefca4e5e7554021343884817652808cf959f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bf6c2427cdd1ae62e0b1e9a55ebaefca4e5e7554021343884817652808cf959f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
maxi
185.161.248.90:4125
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Targets
-
-
Target
bf6c2427cdd1ae62e0b1e9a55ebaefca4e5e7554021343884817652808cf959f
-
Size
1.5MB
-
MD5
b608a9ae94ba4680c0a4c3827d6ed5e9
-
SHA1
09c5fc351b7df7ce3911082df265d63076a70d00
-
SHA256
bf6c2427cdd1ae62e0b1e9a55ebaefca4e5e7554021343884817652808cf959f
-
SHA512
e679db781c0bc11f88633d9c795701ca10cfffd0e1faba96ca7ea149ecde863b5fa30d7ee62b0c1685a524feedf2e93b00637417d14c6b3b4cbb0d440f17aa11
-
SSDEEP
24576:4y22LmZQQXSE5VMsp0zYtKdTmRUQziSQluSOql7QexZBLVmkhAG:/2QmZQESE5/0WCTmRUNlzOqlDxJmr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-