General
-
Target
58ea45cb96543a6d77ae8e6ef7efecb11fb758f399b544209b392ddef8b61d12
-
Size
1.1MB
-
Sample
241107-kp2m7aygre
-
MD5
3bc450f35bde9e4f6d3c1d9ef41774b6
-
SHA1
7e5a9d634bdf72a8f2843abe242d3ccbec874d55
-
SHA256
58ea45cb96543a6d77ae8e6ef7efecb11fb758f399b544209b392ddef8b61d12
-
SHA512
f1208e67d223665a61c96b4ea311439e0490525eaffe305a0c1b80cb85ac5087f961a82f8180d9f46b0cb290d43a5cb6ef43381814fc0bdb71e6b783d80b70e5
-
SSDEEP
24576:8y6tAW/aoxkFkKAa4moBNBEERhMXY6rhW6I2Taf1QtJKDPCW8:r6twIkFkda4moBNBXRh0fWZf1k0
Static task
static1
Behavioral task
behavioral1
Sample
58ea45cb96543a6d77ae8e6ef7efecb11fb758f399b544209b392ddef8b61d12.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
58ea45cb96543a6d77ae8e6ef7efecb11fb758f399b544209b392ddef8b61d12
-
Size
1.1MB
-
MD5
3bc450f35bde9e4f6d3c1d9ef41774b6
-
SHA1
7e5a9d634bdf72a8f2843abe242d3ccbec874d55
-
SHA256
58ea45cb96543a6d77ae8e6ef7efecb11fb758f399b544209b392ddef8b61d12
-
SHA512
f1208e67d223665a61c96b4ea311439e0490525eaffe305a0c1b80cb85ac5087f961a82f8180d9f46b0cb290d43a5cb6ef43381814fc0bdb71e6b783d80b70e5
-
SSDEEP
24576:8y6tAW/aoxkFkKAa4moBNBEERhMXY6rhW6I2Taf1QtJKDPCW8:r6twIkFkda4moBNBXRh0fWZf1k0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1