General
-
Target
9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775
-
Size
1.1MB
-
Sample
241107-mycfrs1dmm
-
MD5
a4b3d94fa4d058ef10abf3a3391d9982
-
SHA1
0f1dba76f81814f9f8d5701e2ef824081015f5be
-
SHA256
9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775
-
SHA512
095aef6ddbfa89b0b73eb1745bb9d01ad125e94abf6c5cef784b2c306a048face02a0145469814ad31c613a5a4bfd353d8f48df63646d9d8a57787b03bc29370
-
SSDEEP
24576:EyHGfP2chxjpCQW7CFkmvDHAD6T4Et81VMMW2V:THG3J5+7CFkIAD6T4EOVt
Static task
static1
Behavioral task
behavioral1
Sample
9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775
-
Size
1.1MB
-
MD5
a4b3d94fa4d058ef10abf3a3391d9982
-
SHA1
0f1dba76f81814f9f8d5701e2ef824081015f5be
-
SHA256
9fb2b2abe9182369cedf29de25ce92167b395093c263747e417dda8f4d3a4775
-
SHA512
095aef6ddbfa89b0b73eb1745bb9d01ad125e94abf6c5cef784b2c306a048face02a0145469814ad31c613a5a4bfd353d8f48df63646d9d8a57787b03bc29370
-
SSDEEP
24576:EyHGfP2chxjpCQW7CFkmvDHAD6T4Et81VMMW2V:THG3J5+7CFkIAD6T4EOVt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1