General
-
Target
83539a427d24f67bafdbfebc984a3fa054218a35b1c313ce3a55b57ddcab0380
-
Size
1.1MB
-
Sample
241107-tq323sxreq
-
MD5
d9eb77ee6e79d2fb87fe1ebd50c019d8
-
SHA1
7b338160c3998de27fde26692543f0b4613bad7f
-
SHA256
83539a427d24f67bafdbfebc984a3fa054218a35b1c313ce3a55b57ddcab0380
-
SHA512
2282a681a3d838b059975d7d9115aeae99db509fb88ebe7e9879d9dd0ccd3247f7722b0c8809742f6689b97e94ecfd599dd066b9ed7246a327ebc3c872e97e4d
-
SSDEEP
24576:xyZ9sSMmSEDA5EDFkVMi1qy/boG9kEC87m1YgN+97KM2LnN9B:kvsSLE5EDFkqi1hEsV70P+zmN9
Static task
static1
Behavioral task
behavioral1
Sample
83539a427d24f67bafdbfebc984a3fa054218a35b1c313ce3a55b57ddcab0380.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
83539a427d24f67bafdbfebc984a3fa054218a35b1c313ce3a55b57ddcab0380
-
Size
1.1MB
-
MD5
d9eb77ee6e79d2fb87fe1ebd50c019d8
-
SHA1
7b338160c3998de27fde26692543f0b4613bad7f
-
SHA256
83539a427d24f67bafdbfebc984a3fa054218a35b1c313ce3a55b57ddcab0380
-
SHA512
2282a681a3d838b059975d7d9115aeae99db509fb88ebe7e9879d9dd0ccd3247f7722b0c8809742f6689b97e94ecfd599dd066b9ed7246a327ebc3c872e97e4d
-
SSDEEP
24576:xyZ9sSMmSEDA5EDFkVMi1qy/boG9kEC87m1YgN+97KM2LnN9B:kvsSLE5EDFkqi1hEsV70P+zmN9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1