General
-
Target
e0f360f681670e5025b5f67a65fa213adaca86c64b7b4863e06d5318eefa1995
-
Size
1.1MB
-
Sample
241105-zs4dhsybpf
-
MD5
d95dde846f6d80403559b5cfcb51b853
-
SHA1
6ddfd518e465d43e43c150a1050d4eda5d18e990
-
SHA256
e0f360f681670e5025b5f67a65fa213adaca86c64b7b4863e06d5318eefa1995
-
SHA512
cd9ac9358dc2405f0247e5d5a4f8caa848faa4d38af8436b60ecf6e8e10459b53c65b901f9046ca263fee913208745a43ab8395e8343b834d8ca9e3e42f2b993
-
SSDEEP
24576:Uy8lMaJYxn+yEbOFk5IrahwzgFjG/4uhDWBeJZJ1HEBbVX3NkS1Y:jE5WcbOFk5pjZuUejJpEBbVXWS1
Static task
static1
Behavioral task
behavioral1
Sample
e0f360f681670e5025b5f67a65fa213adaca86c64b7b4863e06d5318eefa1995.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
e0f360f681670e5025b5f67a65fa213adaca86c64b7b4863e06d5318eefa1995
-
Size
1.1MB
-
MD5
d95dde846f6d80403559b5cfcb51b853
-
SHA1
6ddfd518e465d43e43c150a1050d4eda5d18e990
-
SHA256
e0f360f681670e5025b5f67a65fa213adaca86c64b7b4863e06d5318eefa1995
-
SHA512
cd9ac9358dc2405f0247e5d5a4f8caa848faa4d38af8436b60ecf6e8e10459b53c65b901f9046ca263fee913208745a43ab8395e8343b834d8ca9e3e42f2b993
-
SSDEEP
24576:Uy8lMaJYxn+yEbOFk5IrahwzgFjG/4uhDWBeJZJ1HEBbVX3NkS1Y:jE5WcbOFk5pjZuUejJpEBbVXWS1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1