General
-
Target
05445715726ba73cb0b7783c4ddbcd59e6568da2ab5b1055bb81a5abd28f09bd
-
Size
794KB
-
Sample
241109-vsj8esyenr
-
MD5
00601e7fe0079290640f4825aea3638f
-
SHA1
41d4cf5dfb34bab9d480d5a33ce25c89826b05dc
-
SHA256
05445715726ba73cb0b7783c4ddbcd59e6568da2ab5b1055bb81a5abd28f09bd
-
SHA512
c5f390e7297f44574882b0174aced6a0a008db605b5f7ef8bcc5332609b42b9d48eb5d80029808b760f0143d2a7199ccdc320ae7de3f460da2e7f283bdeacdbf
-
SSDEEP
12288:sy90Yp/Q6pbNFgfCulsQJTZG5UktOsnggBYmpVasPzOwciPTIo4qGCsWJ:syfp/zWi7OsngcYcVzzLJPTI1B7WJ
Static task
static1
Behavioral task
behavioral1
Sample
05445715726ba73cb0b7783c4ddbcd59e6568da2ab5b1055bb81a5abd28f09bd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Targets
-
-
Target
05445715726ba73cb0b7783c4ddbcd59e6568da2ab5b1055bb81a5abd28f09bd
-
Size
794KB
-
MD5
00601e7fe0079290640f4825aea3638f
-
SHA1
41d4cf5dfb34bab9d480d5a33ce25c89826b05dc
-
SHA256
05445715726ba73cb0b7783c4ddbcd59e6568da2ab5b1055bb81a5abd28f09bd
-
SHA512
c5f390e7297f44574882b0174aced6a0a008db605b5f7ef8bcc5332609b42b9d48eb5d80029808b760f0143d2a7199ccdc320ae7de3f460da2e7f283bdeacdbf
-
SSDEEP
12288:sy90Yp/Q6pbNFgfCulsQJTZG5UktOsnggBYmpVasPzOwciPTIo4qGCsWJ:syfp/zWi7OsngcYcVzzLJPTI1B7WJ
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-