General
-
Target
2ce68bb6fcc8ed6acbc052e2b3b7f159824496b04189dccdcff35e015b04dfdcN.exe
-
Size
2.8MB
-
Sample
241130-apt81aymfn
-
MD5
a3daaf05c90ee6bbd023d34d24a9f2c0
-
SHA1
086e648083ac147d4e92f1426ee456172ab70c55
-
SHA256
2ce68bb6fcc8ed6acbc052e2b3b7f159824496b04189dccdcff35e015b04dfdc
-
SHA512
d1ac71be5a211801dc48cdaa314e4bcb15bbe73b25a0a8620048171c99a5e71e49a1679e618c9086c7144cb3ce68fbf4a98c798a5c5c41744a3f5ea4603d71b3
-
SSDEEP
24576:5mjFF4KbhvUScYxns/bl1UkHens7bHf1H2clqK0is+LQM0Hl1i8w0dpfjrXXt40O:5mBzbhvfcYKvlqNiQ/j92FMnv1NVwz
Static task
static1
Behavioral task
behavioral1
Sample
2ce68bb6fcc8ed6acbc052e2b3b7f159824496b04189dccdcff35e015b04dfdcN.exe
Resource
win7-20241023-en
Malware Config
Extracted
redline
Traffic
147.45.44.224:1912
Targets
-
-
Target
2ce68bb6fcc8ed6acbc052e2b3b7f159824496b04189dccdcff35e015b04dfdcN.exe
-
Size
2.8MB
-
MD5
a3daaf05c90ee6bbd023d34d24a9f2c0
-
SHA1
086e648083ac147d4e92f1426ee456172ab70c55
-
SHA256
2ce68bb6fcc8ed6acbc052e2b3b7f159824496b04189dccdcff35e015b04dfdc
-
SHA512
d1ac71be5a211801dc48cdaa314e4bcb15bbe73b25a0a8620048171c99a5e71e49a1679e618c9086c7144cb3ce68fbf4a98c798a5c5c41744a3f5ea4603d71b3
-
SSDEEP
24576:5mjFF4KbhvUScYxns/bl1UkHens7bHf1H2clqK0is+LQM0Hl1i8w0dpfjrXXt40O:5mBzbhvfcYKvlqNiQ/j92FMnv1NVwz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-