General
-
Target
685ab137017eb5bccde5dea2464ea02aa7b52c40de67c2a693009201e94f5028
-
Size
774KB
-
Sample
241111-d66vxa1naw
-
MD5
ed640888bd8d789a8a7f927cbb49128e
-
SHA1
ba37ca70106f81b4395e707cd09ce2424096598b
-
SHA256
685ab137017eb5bccde5dea2464ea02aa7b52c40de67c2a693009201e94f5028
-
SHA512
fae60eaddb63f1186a255b83ef0f3c696c0052c435d6eaebe19a820c460380525a27335e635623af12a9289a5b85d9d734502e85c92565d2262e59db32eb82dd
-
SSDEEP
12288:5y90CRBr6HsH3YF9DMUzEAlXgexJBkseUWkLyxs2EY/7b4JKkdT4jUzimyOSu3:5y7r6VXMwxxrCsOjbNkMqSu3
Static task
static1
Behavioral task
behavioral1
Sample
685ab137017eb5bccde5dea2464ea02aa7b52c40de67c2a693009201e94f5028.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Targets
-
-
Target
685ab137017eb5bccde5dea2464ea02aa7b52c40de67c2a693009201e94f5028
-
Size
774KB
-
MD5
ed640888bd8d789a8a7f927cbb49128e
-
SHA1
ba37ca70106f81b4395e707cd09ce2424096598b
-
SHA256
685ab137017eb5bccde5dea2464ea02aa7b52c40de67c2a693009201e94f5028
-
SHA512
fae60eaddb63f1186a255b83ef0f3c696c0052c435d6eaebe19a820c460380525a27335e635623af12a9289a5b85d9d734502e85c92565d2262e59db32eb82dd
-
SSDEEP
12288:5y90CRBr6HsH3YF9DMUzEAlXgexJBkseUWkLyxs2EY/7b4JKkdT4jUzimyOSu3:5y7r6VXMwxxrCsOjbNkMqSu3
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-