General
-
Target
c131d06c26b53fcd7153918f37bf7c08b3de60ee074a5731e79dd2331147640d
-
Size
1011KB
-
Sample
230820-cwxntaef8z
-
MD5
c7a1e762969a064fb4dcd496ff9562c5
-
SHA1
e5ccc08d7b5655a0ff3a623c9dafaf53e57fe342
-
SHA256
c131d06c26b53fcd7153918f37bf7c08b3de60ee074a5731e79dd2331147640d
-
SHA512
3910ff874c64b1bff6175a51946fc5eaad649ad91e351edecdfc902ba636264556ea533b7be94c19099174ebece1bab2299be4b871985cdf6c21183bb03fe6fc
-
SSDEEP
24576:pyCA2LWtEJzfnsLM89gqcR6Jh4oeOV69T:cCfLWtEfCu96z4oeOV6
Static task
static1
Behavioral task
behavioral1
Sample
c131d06c26b53fcd7153918f37bf7c08b3de60ee074a5731e79dd2331147640d.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
jonka
77.91.124.73:19071
-
auth_value
c95bc30cd252fa6dff2a19fd78bfab4e
Targets
-
-
Target
c131d06c26b53fcd7153918f37bf7c08b3de60ee074a5731e79dd2331147640d
-
Size
1011KB
-
MD5
c7a1e762969a064fb4dcd496ff9562c5
-
SHA1
e5ccc08d7b5655a0ff3a623c9dafaf53e57fe342
-
SHA256
c131d06c26b53fcd7153918f37bf7c08b3de60ee074a5731e79dd2331147640d
-
SHA512
3910ff874c64b1bff6175a51946fc5eaad649ad91e351edecdfc902ba636264556ea533b7be94c19099174ebece1bab2299be4b871985cdf6c21183bb03fe6fc
-
SSDEEP
24576:pyCA2LWtEJzfnsLM89gqcR6Jh4oeOV69T:cCfLWtEfCu96z4oeOV6
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1