General
-
Target
74383a6ef36db7971036f0f0320eb6f5c566786705105cff0dd9d3bbca077d89
-
Size
1.1MB
-
Sample
241104-rmy8ls1cmh
-
MD5
68efff99d079df5c20a3aa3803cdfe88
-
SHA1
e897a1925f8ff50fa4c05fbfbc648d251514ae06
-
SHA256
74383a6ef36db7971036f0f0320eb6f5c566786705105cff0dd9d3bbca077d89
-
SHA512
84abf76823062dd6c0b49ff756d5356f89eeb09805799f4e06eec2484db3ffc86d8bcc52375cd115040400ca0c1e69c8a977d0eaa7baad45082e094607b041fb
-
SSDEEP
24576:syLLiiM3kDbHEFg9mOf/cE0eocIXW3N++HvhOpMuN3:bLuiM3k3HEFg94E08kWw5N
Static task
static1
Behavioral task
behavioral1
Sample
74383a6ef36db7971036f0f0320eb6f5c566786705105cff0dd9d3bbca077d89.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
74383a6ef36db7971036f0f0320eb6f5c566786705105cff0dd9d3bbca077d89
-
Size
1.1MB
-
MD5
68efff99d079df5c20a3aa3803cdfe88
-
SHA1
e897a1925f8ff50fa4c05fbfbc648d251514ae06
-
SHA256
74383a6ef36db7971036f0f0320eb6f5c566786705105cff0dd9d3bbca077d89
-
SHA512
84abf76823062dd6c0b49ff756d5356f89eeb09805799f4e06eec2484db3ffc86d8bcc52375cd115040400ca0c1e69c8a977d0eaa7baad45082e094607b041fb
-
SSDEEP
24576:syLLiiM3kDbHEFg9mOf/cE0eocIXW3N++HvhOpMuN3:bLuiM3k3HEFg94E08kWw5N
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1