General
-
Target
99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a
-
Size
1.1MB
-
Sample
241107-c513latgpk
-
MD5
357de6a1dfbb69b5eddeb32c1b38000b
-
SHA1
0bc1e13df4a26aca58e01bd9338190135b09e881
-
SHA256
99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a
-
SHA512
fea53af844826fe57a0b87b8c19c3b59a785a8a544b057d4578349028c6a7c684b9778533811d092ac895ebf2343ef1cf284403526620186767741a224809122
-
SSDEEP
24576:wySJILOP4DhcOHGEgg9L+Yco9KcgMjJ0Hbt4bX4Bv:3SJILZlcKGEgg9a4KcuHZ4bXY
Static task
static1
Behavioral task
behavioral1
Sample
99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a
-
Size
1.1MB
-
MD5
357de6a1dfbb69b5eddeb32c1b38000b
-
SHA1
0bc1e13df4a26aca58e01bd9338190135b09e881
-
SHA256
99ef893b0c73f2b7df685ef05d07ce24cec85871624fa4f4e0cfa842efd6fe9a
-
SHA512
fea53af844826fe57a0b87b8c19c3b59a785a8a544b057d4578349028c6a7c684b9778533811d092ac895ebf2343ef1cf284403526620186767741a224809122
-
SSDEEP
24576:wySJILOP4DhcOHGEgg9L+Yco9KcgMjJ0Hbt4bX4Bv:3SJILZlcKGEgg9a4KcuHZ4bXY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1