General
-
Target
02b5ef0e9d0c5d291e79a13dea4413966033e8a3ecdaf8d40c9ffd01665c4182
-
Size
1.1MB
-
Sample
241105-xnylcsxdnk
-
MD5
07481291fdf8cb8a017606ecd315594d
-
SHA1
5d097b1e4a68a3dcfff0b526a9151535195a6356
-
SHA256
02b5ef0e9d0c5d291e79a13dea4413966033e8a3ecdaf8d40c9ffd01665c4182
-
SHA512
4d19e08794b1aaa57c0598e823098c2c08403cc09eff12e867afa5104d3d7ef2fb9ff5f0ca8efd0ec1acd42887f800e03f504346e2711bddd52f836676500228
-
SSDEEP
12288:/Mrry90ZsPrJtz47PoDgaTBYyC0E8T0fkg9MVSc59Ib8YPHYEV6JCpuP4txl3E/f:8ytzmoM8E8lg9e5882Dcxwaii3aJLq
Static task
static1
Behavioral task
behavioral1
Sample
02b5ef0e9d0c5d291e79a13dea4413966033e8a3ecdaf8d40c9ffd01665c4182.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
02b5ef0e9d0c5d291e79a13dea4413966033e8a3ecdaf8d40c9ffd01665c4182
-
Size
1.1MB
-
MD5
07481291fdf8cb8a017606ecd315594d
-
SHA1
5d097b1e4a68a3dcfff0b526a9151535195a6356
-
SHA256
02b5ef0e9d0c5d291e79a13dea4413966033e8a3ecdaf8d40c9ffd01665c4182
-
SHA512
4d19e08794b1aaa57c0598e823098c2c08403cc09eff12e867afa5104d3d7ef2fb9ff5f0ca8efd0ec1acd42887f800e03f504346e2711bddd52f836676500228
-
SSDEEP
12288:/Mrry90ZsPrJtz47PoDgaTBYyC0E8T0fkg9MVSc59Ib8YPHYEV6JCpuP4txl3E/f:8ytzmoM8E8lg9e5882Dcxwaii3aJLq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1