General
-
Target
ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8
-
Size
1.1MB
-
Sample
241105-r2z4fstekr
-
MD5
49f20ba05a2e8735318d804d3e7b4240
-
SHA1
ac2dc0060bb1ccf7f30f15f78a4e6c4b07b9186a
-
SHA256
ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8
-
SHA512
ae55c7bedfc5b94b5e1a2d1efac9c34cbb9aa88b8ff701072bf319fc325f94db71992bf81325188aa2ce3c5a433f7ee1b372e492307bfe8e4540fae09e184770
-
SSDEEP
24576:CyO5dapQFTFk3C5eay+scyZkxBZmGUdTXvWK:pwspQFTFkyibwmBdTe
Static task
static1
Behavioral task
behavioral1
Sample
ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8
-
Size
1.1MB
-
MD5
49f20ba05a2e8735318d804d3e7b4240
-
SHA1
ac2dc0060bb1ccf7f30f15f78a4e6c4b07b9186a
-
SHA256
ccfd41c9ac7acffbeeee894ae84997e82fce0df7de84c53f25153019480f19a8
-
SHA512
ae55c7bedfc5b94b5e1a2d1efac9c34cbb9aa88b8ff701072bf319fc325f94db71992bf81325188aa2ce3c5a433f7ee1b372e492307bfe8e4540fae09e184770
-
SSDEEP
24576:CyO5dapQFTFk3C5eay+scyZkxBZmGUdTXvWK:pwspQFTFkyibwmBdTe
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1