General
-
Target
434bc4962df6a8847e926e69bde1882cb0b197c83b9db1b8a61ae367caa0edd1
-
Size
1.1MB
-
Sample
241107-fs53kavpes
-
MD5
9b5ed9bc32a9dc5511b27a7a201a1bb4
-
SHA1
63cf63b849838f9a371b173f56aa110d0e8b6c8b
-
SHA256
434bc4962df6a8847e926e69bde1882cb0b197c83b9db1b8a61ae367caa0edd1
-
SHA512
06ba5cbe56abc17cfc1edf1d4c4566ed48998f1ab3f57358f85ad02217257a161e8fe485e7675121b27831ad5a358e48f2b60ba7ecc0836b83f77c2dd6989f28
-
SSDEEP
24576:zyv9Lx0GRQtoEDg9QfCJpXDCJPKC1QAiIf+gkZzg+9m:GXiaEDg9QEQZKC1lzG3D
Static task
static1
Behavioral task
behavioral1
Sample
434bc4962df6a8847e926e69bde1882cb0b197c83b9db1b8a61ae367caa0edd1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
434bc4962df6a8847e926e69bde1882cb0b197c83b9db1b8a61ae367caa0edd1
-
Size
1.1MB
-
MD5
9b5ed9bc32a9dc5511b27a7a201a1bb4
-
SHA1
63cf63b849838f9a371b173f56aa110d0e8b6c8b
-
SHA256
434bc4962df6a8847e926e69bde1882cb0b197c83b9db1b8a61ae367caa0edd1
-
SHA512
06ba5cbe56abc17cfc1edf1d4c4566ed48998f1ab3f57358f85ad02217257a161e8fe485e7675121b27831ad5a358e48f2b60ba7ecc0836b83f77c2dd6989f28
-
SSDEEP
24576:zyv9Lx0GRQtoEDg9QfCJpXDCJPKC1QAiIf+gkZzg+9m:GXiaEDg9QEQZKC1lzG3D
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1