General
-
Target
b488b9f29cb8897a1854ca1ec2e943c99ab6724a825bfedf5485f147be6a9387.lnk
-
Size
3KB
-
Sample
241130-dl3yhsypdz
-
MD5
b34d7dcf2fd1a08025934b2b3b60c4d3
-
SHA1
2d892b1de088baed8ae4df89536b7e197ea7d83e
-
SHA256
b488b9f29cb8897a1854ca1ec2e943c99ab6724a825bfedf5485f147be6a9387
-
SHA512
03bcf8eb554b5fcab7f843f3841c20a2a008d3dbdc5904577935122ff2c1fd86c975d9aaec6faaf9ed36354af663deaba39901fe4da700c74e8c4cead605cacd
Static task
static1
Behavioral task
behavioral1
Sample
b488b9f29cb8897a1854ca1ec2e943c99ab6724a825bfedf5485f147be6a9387.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b488b9f29cb8897a1854ca1ec2e943c99ab6724a825bfedf5485f147be6a9387.lnk
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
cheat
41.216.183.218:1912
Targets
-
-
Target
b488b9f29cb8897a1854ca1ec2e943c99ab6724a825bfedf5485f147be6a9387.lnk
-
Size
3KB
-
MD5
b34d7dcf2fd1a08025934b2b3b60c4d3
-
SHA1
2d892b1de088baed8ae4df89536b7e197ea7d83e
-
SHA256
b488b9f29cb8897a1854ca1ec2e943c99ab6724a825bfedf5485f147be6a9387
-
SHA512
03bcf8eb554b5fcab7f843f3841c20a2a008d3dbdc5904577935122ff2c1fd86c975d9aaec6faaf9ed36354af663deaba39901fe4da700c74e8c4cead605cacd
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-