General
-
Target
8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156
-
Size
1.1MB
-
Sample
241106-shb3ysvlcr
-
MD5
062c6511014f1aa596138ae8112058b3
-
SHA1
458a98f9be2697b2cdcc4ca382accdd5e4578bd5
-
SHA256
8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156
-
SHA512
b42dc96ec2ea2d43f389af9ec47eba8fa5796dab9c2ad3635bcf043b0b9377327ba4916471c50b7cf8267b6f95aa1a5a23f53c86ec6fecf92658886082558a71
-
SSDEEP
24576:LytjaKUU1ySw9FkZ61h45v0/Oovem1PB/n5SgkTGOU:+p9UU1y9FkZ61exjoBPBkiO
Static task
static1
Behavioral task
behavioral1
Sample
8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156
-
Size
1.1MB
-
MD5
062c6511014f1aa596138ae8112058b3
-
SHA1
458a98f9be2697b2cdcc4ca382accdd5e4578bd5
-
SHA256
8811c70c333468024f208d2de581e0e8387653980fdc15cf7c6564c2dc134156
-
SHA512
b42dc96ec2ea2d43f389af9ec47eba8fa5796dab9c2ad3635bcf043b0b9377327ba4916471c50b7cf8267b6f95aa1a5a23f53c86ec6fecf92658886082558a71
-
SSDEEP
24576:LytjaKUU1ySw9FkZ61h45v0/Oovem1PB/n5SgkTGOU:+p9UU1y9FkZ61exjoBPBkiO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1