General
-
Target
8d53ccfd98c5605a4aadc57429b3665dbbc0f5283eb6aa1cd8eaa8e664e7332e
-
Size
1.1MB
-
Sample
241108-kt49wa1rhq
-
MD5
d1b98656e9f3dd40a956ec4e2559fd72
-
SHA1
ca7186e130191c4f5b094f4f13904e652a7e3657
-
SHA256
8d53ccfd98c5605a4aadc57429b3665dbbc0f5283eb6aa1cd8eaa8e664e7332e
-
SHA512
3db9013b6bdf5548d7f1e7eff10789bfe37fd44d4d763f1b3b7063cc3fb46effc53e75cf8cf0268c2f18facb77848e7a95fd0cdb353f0ae13954cef4ca013b4c
-
SSDEEP
24576:Jy1JOcU6+OAkFk1WUKHNzPPqEYP1S0jYeOT4KIS:81JXUNOAkFkHmNzPPqEj0jYZ3I
Static task
static1
Behavioral task
behavioral1
Sample
8d53ccfd98c5605a4aadc57429b3665dbbc0f5283eb6aa1cd8eaa8e664e7332e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
8d53ccfd98c5605a4aadc57429b3665dbbc0f5283eb6aa1cd8eaa8e664e7332e
-
Size
1.1MB
-
MD5
d1b98656e9f3dd40a956ec4e2559fd72
-
SHA1
ca7186e130191c4f5b094f4f13904e652a7e3657
-
SHA256
8d53ccfd98c5605a4aadc57429b3665dbbc0f5283eb6aa1cd8eaa8e664e7332e
-
SHA512
3db9013b6bdf5548d7f1e7eff10789bfe37fd44d4d763f1b3b7063cc3fb46effc53e75cf8cf0268c2f18facb77848e7a95fd0cdb353f0ae13954cef4ca013b4c
-
SSDEEP
24576:Jy1JOcU6+OAkFk1WUKHNzPPqEYP1S0jYeOT4KIS:81JXUNOAkFkHmNzPPqEj0jYZ3I
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1