General
-
Target
45d3cd6234e582fb5cf231a3dd9aa94f2c7f1de411ce4bb8b5a236673487b74a
-
Size
1.1MB
-
Sample
241105-rv515atdjq
-
MD5
c6390540ebafa0d7190b3026311d6c73
-
SHA1
7c1e50cbb25df7db4dfc03b614314ed16a024931
-
SHA256
45d3cd6234e582fb5cf231a3dd9aa94f2c7f1de411ce4bb8b5a236673487b74a
-
SHA512
4b12ac47025503f45ef24e4d11ee4ce7781042ebda6f13f2d57be416f619ecd41e1e01a9c3caec306fc0d10cc67d9e759afba9eb54227f097d07d79e62a49bce
-
SSDEEP
12288:BMrty901xCEMN+QLmlg8jJnFkpnwLWV/2mQrMtgvtyMYS9vcksCL/f4JIw6qntp3:AyjEI+QvUFk//xKMtgUq9xw1ntHxY+F
Static task
static1
Behavioral task
behavioral1
Sample
45d3cd6234e582fb5cf231a3dd9aa94f2c7f1de411ce4bb8b5a236673487b74a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
45d3cd6234e582fb5cf231a3dd9aa94f2c7f1de411ce4bb8b5a236673487b74a
-
Size
1.1MB
-
MD5
c6390540ebafa0d7190b3026311d6c73
-
SHA1
7c1e50cbb25df7db4dfc03b614314ed16a024931
-
SHA256
45d3cd6234e582fb5cf231a3dd9aa94f2c7f1de411ce4bb8b5a236673487b74a
-
SHA512
4b12ac47025503f45ef24e4d11ee4ce7781042ebda6f13f2d57be416f619ecd41e1e01a9c3caec306fc0d10cc67d9e759afba9eb54227f097d07d79e62a49bce
-
SSDEEP
12288:BMrty901xCEMN+QLmlg8jJnFkpnwLWV/2mQrMtgvtyMYS9vcksCL/f4JIw6qntp3:AyjEI+QvUFk//xKMtgUq9xw1ntHxY+F
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1