General
-
Target
79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5
-
Size
794KB
-
Sample
241111-cjcswazhrf
-
MD5
ed66cecb476e303afe8fb8bfb42454d5
-
SHA1
04db8d96824a6a66512baabcb19fad07fcb198f5
-
SHA256
79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5
-
SHA512
5dcb4538cf6235a0e11abee0ccd8a05376e6667c9762e971ab42954e2c3b740293c779746127afa851897b458e334396da54dc323c0f2cf529f0b537ebe32977
-
SSDEEP
12288:oy90ZJl/+d+0aH9sYGgPkATaPp6iKsCQr8vIzQLWmDm5iYseC:oys//lJH6gPJTaPp6iKsCQkfWsm55C
Static task
static1
Behavioral task
behavioral1
Sample
79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dork
185.161.248.73:4164
-
auth_value
e81be7d6cfb453cc812e1b4890eeadad
Targets
-
-
Target
79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5
-
Size
794KB
-
MD5
ed66cecb476e303afe8fb8bfb42454d5
-
SHA1
04db8d96824a6a66512baabcb19fad07fcb198f5
-
SHA256
79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5
-
SHA512
5dcb4538cf6235a0e11abee0ccd8a05376e6667c9762e971ab42954e2c3b740293c779746127afa851897b458e334396da54dc323c0f2cf529f0b537ebe32977
-
SSDEEP
12288:oy90ZJl/+d+0aH9sYGgPkATaPp6iKsCQr8vIzQLWmDm5iYseC:oys//lJH6gPJTaPp6iKsCQkfWsm55C
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-