General
-
Target
bcfed879203a5412d56e9fa0b18cb2ba39ec70b35241215fdffcb145ec64d372.exe
-
Size
2.3MB
-
Sample
241123-rf8hpssncq
-
MD5
2dee285e0dfc56b423c87de5e33407ce
-
SHA1
2ae1082d75469390df22b0fb31568e2a9c5c1a24
-
SHA256
bcfed879203a5412d56e9fa0b18cb2ba39ec70b35241215fdffcb145ec64d372
-
SHA512
f6001e9542929923fb4b3e1d1218a66b25103a84b46756dd89d3b70b5fcad919cd8eade98a881ea291a7fea9a596a43b40c8c2757012a46564a7cafc419c866d
-
SSDEEP
49152:H5+hFHxq1JcJ05gwY7xnXst4sQWKh+BH8gjlPh4Tcaxiz8lVHTIioOFZQ+t:H5aFRqxl6hyHHa+BH1jngcaxiqZ7t
Static task
static1
Behavioral task
behavioral1
Sample
bcfed879203a5412d56e9fa0b18cb2ba39ec70b35241215fdffcb145ec64d372.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bcfed879203a5412d56e9fa0b18cb2ba39ec70b35241215fdffcb145ec64d372.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
@normhhd
62.182.156.24:12780
-
auth_value
bb67ccc49d44343128ca161d7fe51029
Targets
-
-
Target
bcfed879203a5412d56e9fa0b18cb2ba39ec70b35241215fdffcb145ec64d372.exe
-
Size
2.3MB
-
MD5
2dee285e0dfc56b423c87de5e33407ce
-
SHA1
2ae1082d75469390df22b0fb31568e2a9c5c1a24
-
SHA256
bcfed879203a5412d56e9fa0b18cb2ba39ec70b35241215fdffcb145ec64d372
-
SHA512
f6001e9542929923fb4b3e1d1218a66b25103a84b46756dd89d3b70b5fcad919cd8eade98a881ea291a7fea9a596a43b40c8c2757012a46564a7cafc419c866d
-
SSDEEP
49152:H5+hFHxq1JcJ05gwY7xnXst4sQWKh+BH8gjlPh4Tcaxiz8lVHTIioOFZQ+t:H5aFRqxl6hyHHa+BH1jngcaxiqZ7t
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-