General
-
Target
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e
-
Size
2.3MB
-
Sample
241108-3e8mvs1paz
-
MD5
aa25a6dbf0319ac7466e5e4c8b7ee4a3
-
SHA1
f5cfc23ae0d2785f5aae32a07eaf15f9cfc4ac24
-
SHA256
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e
-
SHA512
ccd6232ae5918110ef911fbd27de2619cc2a1cbf1b08029b4953166bdaaa2ba087d418726e612dc84afc803e1cc95229834e1b0c91696471b8b08e4c6ff080df
-
SSDEEP
49152:J84+V9pjc8VJiy7jHrpb3KPyT5cRIdesz1E:JEV9Rv7jLpjKKVGIdZ1E
Static task
static1
Behavioral task
behavioral1
Sample
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
arkei
Default
188.212.124.13/lYWcN6H7B1.php
Extracted
redline
ОШИБКА
185.183.32.161:45391
-
auth_value
d18b47a36849f89352e431c80fc6cb5d
Extracted
redline
11/13
94.103.9.133:1169
-
auth_value
b69e61a3d7a039daa16500dfdc1eaa12
Targets
-
-
Target
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e
-
Size
2.3MB
-
MD5
aa25a6dbf0319ac7466e5e4c8b7ee4a3
-
SHA1
f5cfc23ae0d2785f5aae32a07eaf15f9cfc4ac24
-
SHA256
4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e
-
SHA512
ccd6232ae5918110ef911fbd27de2619cc2a1cbf1b08029b4953166bdaaa2ba087d418726e612dc84afc803e1cc95229834e1b0c91696471b8b08e4c6ff080df
-
SSDEEP
49152:J84+V9pjc8VJiy7jHrpb3KPyT5cRIdesz1E:JEV9Rv7jLpjKKVGIdZ1E
-
Arkei family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1