General
-
Target
e89afb9d648769916f8b523af396c23e9cf03f1e94439293b6ce794809463bd6
-
Size
1.1MB
-
Sample
241109-bv7xqavakq
-
MD5
3512d01baab3d3da2219ae03e13e7794
-
SHA1
04e1f7363405d286bcdea5f0425df2bbcb3eefa8
-
SHA256
e89afb9d648769916f8b523af396c23e9cf03f1e94439293b6ce794809463bd6
-
SHA512
2f0c1875c6322d2c824f041c71dc4b113705dc57f8e054001c03a52f04d4ca88d85dba52793cf676a0b8c8f82d7ac0f3f71ab26d60f645435d93b2ef78290f30
-
SSDEEP
24576:QyBtCAfFt6E+SCbzFklFUleKlCmRDaEfifocK3LY:XBRz1CbzFklWlHlXR+7QcuL
Static task
static1
Behavioral task
behavioral1
Sample
e89afb9d648769916f8b523af396c23e9cf03f1e94439293b6ce794809463bd6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
e89afb9d648769916f8b523af396c23e9cf03f1e94439293b6ce794809463bd6
-
Size
1.1MB
-
MD5
3512d01baab3d3da2219ae03e13e7794
-
SHA1
04e1f7363405d286bcdea5f0425df2bbcb3eefa8
-
SHA256
e89afb9d648769916f8b523af396c23e9cf03f1e94439293b6ce794809463bd6
-
SHA512
2f0c1875c6322d2c824f041c71dc4b113705dc57f8e054001c03a52f04d4ca88d85dba52793cf676a0b8c8f82d7ac0f3f71ab26d60f645435d93b2ef78290f30
-
SSDEEP
24576:QyBtCAfFt6E+SCbzFklFUleKlCmRDaEfifocK3LY:XBRz1CbzFklWlHlXR+7QcuL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1