General
-
Target
ec010169ab26ef399ba141489de200370103d63c97730a23dec205e572373595
-
Size
1.1MB
-
Sample
241108-grwm6sxbph
-
MD5
706519295bfcb22138fa71d3f109180d
-
SHA1
699f53eba1de0b0af19d3df307f089e8610a21af
-
SHA256
ec010169ab26ef399ba141489de200370103d63c97730a23dec205e572373595
-
SHA512
9557490939100e2e7b38771eb744d95d25948921b840c1c13af21a38aa816501e2ed317eea4ea50844402e343e6863de0aa3d0e776e6440ada68f8311f85c7bb
-
SSDEEP
24576:PyRZYPgCpW9HFkJ40zFV1Mf1DC6XewEiAGIF1cWWJFT:aRGICpKHFkLZzK1DCK9AbAWWJF
Static task
static1
Behavioral task
behavioral1
Sample
ec010169ab26ef399ba141489de200370103d63c97730a23dec205e572373595.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
ec010169ab26ef399ba141489de200370103d63c97730a23dec205e572373595
-
Size
1.1MB
-
MD5
706519295bfcb22138fa71d3f109180d
-
SHA1
699f53eba1de0b0af19d3df307f089e8610a21af
-
SHA256
ec010169ab26ef399ba141489de200370103d63c97730a23dec205e572373595
-
SHA512
9557490939100e2e7b38771eb744d95d25948921b840c1c13af21a38aa816501e2ed317eea4ea50844402e343e6863de0aa3d0e776e6440ada68f8311f85c7bb
-
SSDEEP
24576:PyRZYPgCpW9HFkJ40zFV1Mf1DC6XewEiAGIF1cWWJFT:aRGICpKHFkLZzK1DCK9AbAWWJF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1