General
-
Target
6a3abfd66ff14191ca0917eae121331769128684e647c3797932f7eb10938360
-
Size
1.1MB
-
Sample
241108-vz4kmswdkg
-
MD5
663e686e49f9a22580480d8efa738896
-
SHA1
266d4202f2199ba168938a8706f3032ef51797d4
-
SHA256
6a3abfd66ff14191ca0917eae121331769128684e647c3797932f7eb10938360
-
SHA512
7a683f78427c5ed59319b11dc36b8f8930551840cb7c9b1bb63bd21188b2384c0586ed2cda718a3c42f3ec3a7b5202a7348a3d24bfd3b7139f6df377e48f0fe2
-
SSDEEP
24576:LyiqLAzsAdK3WE5Bm8wFkuvncDGuN8B9jSIjMmDwNlb1X6WF9:+Daq3m8wFkskK9+IjMmilbR6Y
Static task
static1
Behavioral task
behavioral1
Sample
6a3abfd66ff14191ca0917eae121331769128684e647c3797932f7eb10938360.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
6a3abfd66ff14191ca0917eae121331769128684e647c3797932f7eb10938360
-
Size
1.1MB
-
MD5
663e686e49f9a22580480d8efa738896
-
SHA1
266d4202f2199ba168938a8706f3032ef51797d4
-
SHA256
6a3abfd66ff14191ca0917eae121331769128684e647c3797932f7eb10938360
-
SHA512
7a683f78427c5ed59319b11dc36b8f8930551840cb7c9b1bb63bd21188b2384c0586ed2cda718a3c42f3ec3a7b5202a7348a3d24bfd3b7139f6df377e48f0fe2
-
SSDEEP
24576:LyiqLAzsAdK3WE5Bm8wFkuvncDGuN8B9jSIjMmDwNlb1X6WF9:+Daq3m8wFkskK9+IjMmilbR6Y
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1