General
-
Target
21bcc215616958d6e41751acec99b76badeeae3b948c1059436734213c9dcde3
-
Size
1.1MB
-
Sample
241106-ysgzvawlcy
-
MD5
30a5e9aff9df873661a06505bf8533aa
-
SHA1
6682750d17eb8eb5fafdfaf59a623059f9c9b996
-
SHA256
21bcc215616958d6e41751acec99b76badeeae3b948c1059436734213c9dcde3
-
SHA512
1169a2907c74c06caa1c81ce669598658998a804d695fd92f6f26aa667e5b699b640b2a7d4ebf45fbf94b11c987ea6ea3097a6d2531bfe25f0d9533bf26bd582
-
SSDEEP
24576:GyAcH8YVU68yUeECg9GLPX6rva/EQiGUCytizeXQJa6fqikzPO:VA88Yu6/ECg9G76jy3iGUCy4zveD
Static task
static1
Behavioral task
behavioral1
Sample
21bcc215616958d6e41751acec99b76badeeae3b948c1059436734213c9dcde3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
21bcc215616958d6e41751acec99b76badeeae3b948c1059436734213c9dcde3
-
Size
1.1MB
-
MD5
30a5e9aff9df873661a06505bf8533aa
-
SHA1
6682750d17eb8eb5fafdfaf59a623059f9c9b996
-
SHA256
21bcc215616958d6e41751acec99b76badeeae3b948c1059436734213c9dcde3
-
SHA512
1169a2907c74c06caa1c81ce669598658998a804d695fd92f6f26aa667e5b699b640b2a7d4ebf45fbf94b11c987ea6ea3097a6d2531bfe25f0d9533bf26bd582
-
SSDEEP
24576:GyAcH8YVU68yUeECg9GLPX6rva/EQiGUCytizeXQJa6fqikzPO:VA88Yu6/ECg9G76jy3iGUCy4zveD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1