General
-
Target
9a58ccb44b9b2857a2861dfb74e6e55a0b2d4268dcd6458f0806f74cf7f7b49d
-
Size
1.1MB
-
Sample
241106-ql79fsznav
-
MD5
a24b7e457ccfb65217bdd508ff932a03
-
SHA1
ed32a3a10583257fa83746e48564b1a1f50660f3
-
SHA256
9a58ccb44b9b2857a2861dfb74e6e55a0b2d4268dcd6458f0806f74cf7f7b49d
-
SHA512
0c83e4784658fda3d05ac5aa6874f2982b7216d13aff83a57fa55230f0e180d97f628d07a915a6ff2e9d51156dae6d122b1d303d734acd3b674cb578c9a6794c
-
SSDEEP
24576:Fy1XEffszRxFkypE48JmXGg3E3jfmk268E:g10ffsNxFkbrA03jF26
Static task
static1
Behavioral task
behavioral1
Sample
9a58ccb44b9b2857a2861dfb74e6e55a0b2d4268dcd6458f0806f74cf7f7b49d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
9a58ccb44b9b2857a2861dfb74e6e55a0b2d4268dcd6458f0806f74cf7f7b49d
-
Size
1.1MB
-
MD5
a24b7e457ccfb65217bdd508ff932a03
-
SHA1
ed32a3a10583257fa83746e48564b1a1f50660f3
-
SHA256
9a58ccb44b9b2857a2861dfb74e6e55a0b2d4268dcd6458f0806f74cf7f7b49d
-
SHA512
0c83e4784658fda3d05ac5aa6874f2982b7216d13aff83a57fa55230f0e180d97f628d07a915a6ff2e9d51156dae6d122b1d303d734acd3b674cb578c9a6794c
-
SSDEEP
24576:Fy1XEffszRxFkypE48JmXGg3E3jfmk268E:g10ffsNxFkbrA03jF26
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1