General
-
Target
bff4de75e08d2e4d827853bb0f72af62
-
Size
978KB
-
Sample
240311-f4z1pacg64
-
MD5
bff4de75e08d2e4d827853bb0f72af62
-
SHA1
44e7caebe4cee96fa8f9f754fdc756168a5871fa
-
SHA256
e9764c7c423c909f1aa4a2ab41ac0c3fbe592a90a1cb1a98028a4fc0320af0b1
-
SHA512
2819478d75d6635d46d30785f6828619b0da2ada65878a44084095010b7026480a80a72112927b8ae47b72445094bf8e693b0d50dd0b5238beeeff34004958a7
-
SSDEEP
24576:tr065nEVHc2YRQCWnwO5BqGff8NfMuYETj5mWGYlyy/2zw:trpnRwwAfwMG5mWGYlyM2
Static task
static1
Behavioral task
behavioral1
Sample
bff4de75e08d2e4d827853bb0f72af62.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bff4de75e08d2e4d827853bb0f72af62.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
@Cryptex777
109.248.203.166:29888
Targets
-
-
Target
bff4de75e08d2e4d827853bb0f72af62
-
Size
978KB
-
MD5
bff4de75e08d2e4d827853bb0f72af62
-
SHA1
44e7caebe4cee96fa8f9f754fdc756168a5871fa
-
SHA256
e9764c7c423c909f1aa4a2ab41ac0c3fbe592a90a1cb1a98028a4fc0320af0b1
-
SHA512
2819478d75d6635d46d30785f6828619b0da2ada65878a44084095010b7026480a80a72112927b8ae47b72445094bf8e693b0d50dd0b5238beeeff34004958a7
-
SSDEEP
24576:tr065nEVHc2YRQCWnwO5BqGff8NfMuYETj5mWGYlyy/2zw:trpnRwwAfwMG5mWGYlyM2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-