General
-
Target
b342c41a1accf6330ce187afe168dda690b7ed02a495adf62dd41d5d4b79f4f2
-
Size
1.1MB
-
Sample
241105-h193lazjgk
-
MD5
ed0ca450de99b414264363498b66234d
-
SHA1
b558e272ae6216c831f6135058f990cee456168e
-
SHA256
b342c41a1accf6330ce187afe168dda690b7ed02a495adf62dd41d5d4b79f4f2
-
SHA512
5a9c3acdc430ac32ed24b3c26c86e4c4177ed40e903512e726b943476d0720d8d43d44a076cd59dd999f8a92275d2c132438ecccdc80e43e6806198c0bbdcccb
-
SSDEEP
24576:yyndTyFG45AHNEbglL3FkDSAvWfy5fkLCuI7gAhjvGDbsC+dRTI0o0gT:ZnZyI45AH2slL3FkeAOKxjz0ok+dREd0
Static task
static1
Behavioral task
behavioral1
Sample
b342c41a1accf6330ce187afe168dda690b7ed02a495adf62dd41d5d4b79f4f2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
b342c41a1accf6330ce187afe168dda690b7ed02a495adf62dd41d5d4b79f4f2
-
Size
1.1MB
-
MD5
ed0ca450de99b414264363498b66234d
-
SHA1
b558e272ae6216c831f6135058f990cee456168e
-
SHA256
b342c41a1accf6330ce187afe168dda690b7ed02a495adf62dd41d5d4b79f4f2
-
SHA512
5a9c3acdc430ac32ed24b3c26c86e4c4177ed40e903512e726b943476d0720d8d43d44a076cd59dd999f8a92275d2c132438ecccdc80e43e6806198c0bbdcccb
-
SSDEEP
24576:yyndTyFG45AHNEbglL3FkDSAvWfy5fkLCuI7gAhjvGDbsC+dRTI0o0gT:ZnZyI45AH2slL3FkeAOKxjz0ok+dREd0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1