General
-
Target
c184cab6a9f48a02334fd3abdfba8ff9b63e53fb573972db063678724b1900e5
-
Size
1.1MB
-
Sample
241105-gh5vgswgmr
-
MD5
a78c8949f2bd849c621263b0bc6f2fb0
-
SHA1
7d3c379dd15fd9f09c0ddd40139c03fafbf65e29
-
SHA256
c184cab6a9f48a02334fd3abdfba8ff9b63e53fb573972db063678724b1900e5
-
SHA512
5484002a5094bcb1c3283a3db9a52c5c0ff5f01a1eed78d358b69ea7d54198f4892b7f53782152c7a5fd909f4f94ec990a24b6b6739bda71cd40a17a1d93a334
-
SSDEEP
24576:IyKaTofEyYZYkFk8Yuar5S1t/d5FWxm3yESRGzV4+6YRm:PKadvZYkFk8YSjVMmiESRF+BR
Static task
static1
Behavioral task
behavioral1
Sample
c184cab6a9f48a02334fd3abdfba8ff9b63e53fb573972db063678724b1900e5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
c184cab6a9f48a02334fd3abdfba8ff9b63e53fb573972db063678724b1900e5
-
Size
1.1MB
-
MD5
a78c8949f2bd849c621263b0bc6f2fb0
-
SHA1
7d3c379dd15fd9f09c0ddd40139c03fafbf65e29
-
SHA256
c184cab6a9f48a02334fd3abdfba8ff9b63e53fb573972db063678724b1900e5
-
SHA512
5484002a5094bcb1c3283a3db9a52c5c0ff5f01a1eed78d358b69ea7d54198f4892b7f53782152c7a5fd909f4f94ec990a24b6b6739bda71cd40a17a1d93a334
-
SSDEEP
24576:IyKaTofEyYZYkFk8Yuar5S1t/d5FWxm3yESRGzV4+6YRm:PKadvZYkFk8YSjVMmiESRF+BR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1