General
-
Target
9d4c4687546c59711b3d0f302015b3c608684fd5969726328191ed358e55a269
-
Size
794KB
-
Sample
241111-agmh7aycmh
-
MD5
c9e558a968ff1a7983d590762cc49623
-
SHA1
c263f4da14d4b5ec3f51393c3cacc0aed9cf18f0
-
SHA256
9d4c4687546c59711b3d0f302015b3c608684fd5969726328191ed358e55a269
-
SHA512
b497c56b2fb9d478e80af3108953ca46eaf14eb531dfe247569d626d21f7313ce31dac772c4c5b815871dd3eaeb25d89c08b216e591496493d1f2a65bba95ca9
-
SSDEEP
12288:Py90VbWcDdqo6aISxFqH0ATrYk8593FJHfiTidGpNMTy2+9JlrEy//LPkDRll:PyC9DJxoH0ATMn3xsBDKPl
Static task
static1
Behavioral task
behavioral1
Sample
9d4c4687546c59711b3d0f302015b3c608684fd5969726328191ed358e55a269.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
danko
185.161.248.73:4164
-
auth_value
784d42a6c1eb1a5060b8bcd3696f5f1e
Targets
-
-
Target
9d4c4687546c59711b3d0f302015b3c608684fd5969726328191ed358e55a269
-
Size
794KB
-
MD5
c9e558a968ff1a7983d590762cc49623
-
SHA1
c263f4da14d4b5ec3f51393c3cacc0aed9cf18f0
-
SHA256
9d4c4687546c59711b3d0f302015b3c608684fd5969726328191ed358e55a269
-
SHA512
b497c56b2fb9d478e80af3108953ca46eaf14eb531dfe247569d626d21f7313ce31dac772c4c5b815871dd3eaeb25d89c08b216e591496493d1f2a65bba95ca9
-
SSDEEP
12288:Py90VbWcDdqo6aISxFqH0ATrYk8593FJHfiTidGpNMTy2+9JlrEy//LPkDRll:PyC9DJxoH0ATMn3xsBDKPl
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-