General
-
Target
16df818177cc642af38b249c9a7f7d1596a63808794ab31a82b9958e0a6a5a89
-
Size
1.1MB
-
Sample
241104-11vl1sybnh
-
MD5
abe8d8943932bd347111d7d81064d716
-
SHA1
7009162eb6ae9ada5d7733adc052467190cb850b
-
SHA256
16df818177cc642af38b249c9a7f7d1596a63808794ab31a82b9958e0a6a5a89
-
SHA512
46ab2c396e776da7ac72bfbb9b5d331a25cf5dfb882796bc8fd4da68a798932b667c5fe2b0ea55a5a704b91978d0381189755978c7f30f44ade58bf4b4d65c5e
-
SSDEEP
12288:mMrBy90aYoRiOF/sCc5DivCgZo5JjJnFkqAoRFk4Mhfiu24AGFVvlLtDMgYU3UeS:HyfACclMCPFkWM8GnNLtIg3zuKypKnc
Static task
static1
Behavioral task
behavioral1
Sample
16df818177cc642af38b249c9a7f7d1596a63808794ab31a82b9958e0a6a5a89.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
16df818177cc642af38b249c9a7f7d1596a63808794ab31a82b9958e0a6a5a89
-
Size
1.1MB
-
MD5
abe8d8943932bd347111d7d81064d716
-
SHA1
7009162eb6ae9ada5d7733adc052467190cb850b
-
SHA256
16df818177cc642af38b249c9a7f7d1596a63808794ab31a82b9958e0a6a5a89
-
SHA512
46ab2c396e776da7ac72bfbb9b5d331a25cf5dfb882796bc8fd4da68a798932b667c5fe2b0ea55a5a704b91978d0381189755978c7f30f44ade58bf4b4d65c5e
-
SSDEEP
12288:mMrBy90aYoRiOF/sCc5DivCgZo5JjJnFkqAoRFk4Mhfiu24AGFVvlLtDMgYU3UeS:HyfACclMCPFkWM8GnNLtIg3zuKypKnc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1