General
-
Target
4902a7d405b1eff226d1f5218a24832566c2a4f4c090083c0c4c6053249a0e67
-
Size
1.1MB
-
Sample
241106-tj9ahssmcx
-
MD5
78dd4fd9f777c7d43638b9ba85c28ae0
-
SHA1
05d68d7ea7252bddb82e33b4a786498adcd83003
-
SHA256
4902a7d405b1eff226d1f5218a24832566c2a4f4c090083c0c4c6053249a0e67
-
SHA512
306aa61ef1d6818da3caa8acdf1f4320d00075013fe351884f12ec5a27341f49e190ac02aababd7b193817a1d12ae0cd3d266ad1b87c7c33498b3c2cfa09314f
-
SSDEEP
24576:DyAtZjmakJ3MR716xZ0FkKdHCTd653wDHq8VhDhNlMXv8ngVGGw:WIZuJ3MR71U0FkRdDjZHlMfzo
Static task
static1
Behavioral task
behavioral1
Sample
4902a7d405b1eff226d1f5218a24832566c2a4f4c090083c0c4c6053249a0e67.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
4902a7d405b1eff226d1f5218a24832566c2a4f4c090083c0c4c6053249a0e67
-
Size
1.1MB
-
MD5
78dd4fd9f777c7d43638b9ba85c28ae0
-
SHA1
05d68d7ea7252bddb82e33b4a786498adcd83003
-
SHA256
4902a7d405b1eff226d1f5218a24832566c2a4f4c090083c0c4c6053249a0e67
-
SHA512
306aa61ef1d6818da3caa8acdf1f4320d00075013fe351884f12ec5a27341f49e190ac02aababd7b193817a1d12ae0cd3d266ad1b87c7c33498b3c2cfa09314f
-
SSDEEP
24576:DyAtZjmakJ3MR716xZ0FkKdHCTd653wDHq8VhDhNlMXv8ngVGGw:WIZuJ3MR71U0FkRdDjZHlMfzo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1