General
-
Target
848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a
-
Size
1.1MB
-
Sample
241107-r8vsbavakn
-
MD5
7a35578ed06af38c4fe8a0608d7ce4d4
-
SHA1
66cc7bde26c00df1d6f4764ec80e763d3d6071e3
-
SHA256
848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a
-
SHA512
982576556dbb801c17e09ef9b50453a45075c7243a113f9f0ee28cf6533f63e418c8cb61568eb4c87bdfb06fb68f108fca0dda29ffc0fd7ff7769ccc1c6d4139
-
SSDEEP
24576:kyruxxdwFyMxhUKhjwE1g9upCYl7xcXQdFQN6QXwfl:zruxxiyMxOKuE1g9urCQzmX
Static task
static1
Behavioral task
behavioral1
Sample
848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a
-
Size
1.1MB
-
MD5
7a35578ed06af38c4fe8a0608d7ce4d4
-
SHA1
66cc7bde26c00df1d6f4764ec80e763d3d6071e3
-
SHA256
848b4118e71968a14ebb6062e66a439f9731a3b801c7fce71398a6221c8ea83a
-
SHA512
982576556dbb801c17e09ef9b50453a45075c7243a113f9f0ee28cf6533f63e418c8cb61568eb4c87bdfb06fb68f108fca0dda29ffc0fd7ff7769ccc1c6d4139
-
SSDEEP
24576:kyruxxdwFyMxhUKhjwE1g9upCYl7xcXQdFQN6QXwfl:zruxxiyMxOKuE1g9urCQzmX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1