General
-
Target
a00e1b63a334572d366890c336714c12d4e5e6feb30cdbaaff1ca8a0b6debb3b
-
Size
890KB
-
Sample
241111-jvqbnswfnb
-
MD5
adc1c5de298a24ffa7bd5e56520df57a
-
SHA1
a51cf0449ff0763a933d0a909c1f626f2619cd1a
-
SHA256
a00e1b63a334572d366890c336714c12d4e5e6feb30cdbaaff1ca8a0b6debb3b
-
SHA512
0828cba584b7a047578bca4be6ccfd94e5353664be73f4aa0b4131231967df08867c580b4fcb6a624d2b265fefd1706d402f1e1e85c25b0c9c9e99383c0cdb62
-
SSDEEP
24576:xyH6Ei8w1nDR3Hni1cOqv44b9oruXkCzox5ozLO:kaow1DVO2PSaXFc5oz
Static task
static1
Behavioral task
behavioral1
Sample
a00e1b63a334572d366890c336714c12d4e5e6feb30cdbaaff1ca8a0b6debb3b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Targets
-
-
Target
a00e1b63a334572d366890c336714c12d4e5e6feb30cdbaaff1ca8a0b6debb3b
-
Size
890KB
-
MD5
adc1c5de298a24ffa7bd5e56520df57a
-
SHA1
a51cf0449ff0763a933d0a909c1f626f2619cd1a
-
SHA256
a00e1b63a334572d366890c336714c12d4e5e6feb30cdbaaff1ca8a0b6debb3b
-
SHA512
0828cba584b7a047578bca4be6ccfd94e5353664be73f4aa0b4131231967df08867c580b4fcb6a624d2b265fefd1706d402f1e1e85c25b0c9c9e99383c0cdb62
-
SSDEEP
24576:xyH6Ei8w1nDR3Hni1cOqv44b9oruXkCzox5ozLO:kaow1DVO2PSaXFc5oz
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-