General
-
Target
0b832dce0ec84a0b5110ae62ffd49cc35b2802c465754d1b8734f43fcd5f88aa
-
Size
794KB
-
Sample
241110-gc2kwatnfm
-
MD5
fc0c0c7a9a072e1d7c8cc45659d0c4b8
-
SHA1
c0b8683571d845dcae6aba303412e21bcefc787e
-
SHA256
0b832dce0ec84a0b5110ae62ffd49cc35b2802c465754d1b8734f43fcd5f88aa
-
SHA512
d8287b455470e0e841761b97add8b324fc49466ea80dccedb3a1440b09d17f13540718a1afbd73cfc96eff32f014289ee706873d9f048c74ee03867877984d5c
-
SSDEEP
12288:ry90PjDjtHy/kqBwaYHJ7TIbnn2Ms4R5RwqaPlk5neKLkJxDYj1tkTx8GYh:ryA48SbyJPynnRwqaNkIeYlYjzkTfYh
Static task
static1
Behavioral task
behavioral1
Sample
0b832dce0ec84a0b5110ae62ffd49cc35b2802c465754d1b8734f43fcd5f88aa.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Targets
-
-
Target
0b832dce0ec84a0b5110ae62ffd49cc35b2802c465754d1b8734f43fcd5f88aa
-
Size
794KB
-
MD5
fc0c0c7a9a072e1d7c8cc45659d0c4b8
-
SHA1
c0b8683571d845dcae6aba303412e21bcefc787e
-
SHA256
0b832dce0ec84a0b5110ae62ffd49cc35b2802c465754d1b8734f43fcd5f88aa
-
SHA512
d8287b455470e0e841761b97add8b324fc49466ea80dccedb3a1440b09d17f13540718a1afbd73cfc96eff32f014289ee706873d9f048c74ee03867877984d5c
-
SSDEEP
12288:ry90PjDjtHy/kqBwaYHJ7TIbnn2Ms4R5RwqaPlk5neKLkJxDYj1tkTx8GYh:ryA48SbyJPynnRwqaNkIeYlYjzkTfYh
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-