General
-
Target
4bad89428f866849e45904254b49dcb2eb4d780ebde5b61d2ca490b31d6269f2
-
Size
1.1MB
-
Sample
241109-kafgeazpgv
-
MD5
093d3dd55c4248854181576cb3ed94fd
-
SHA1
3232a0e657e2c12fa7056c742c7622c3973a4023
-
SHA256
4bad89428f866849e45904254b49dcb2eb4d780ebde5b61d2ca490b31d6269f2
-
SHA512
57621fdedeee9bc71a9d85340aa3c1ac73e36cc1ea4ba4da9bbfc199b7ccc2d811c287ac8489498933afc99be96c65fdd86b6c5ac371254c30b18a79794591da
-
SSDEEP
24576:hyCst2MPEGg9LijrW2Sr9Tafha5oSgTXc/OgmnWBn2qZMecxrD67:UCst2MPEGg9LX2Sr9TEhaqSkgnLBn2Mj
Static task
static1
Behavioral task
behavioral1
Sample
4bad89428f866849e45904254b49dcb2eb4d780ebde5b61d2ca490b31d6269f2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
4bad89428f866849e45904254b49dcb2eb4d780ebde5b61d2ca490b31d6269f2
-
Size
1.1MB
-
MD5
093d3dd55c4248854181576cb3ed94fd
-
SHA1
3232a0e657e2c12fa7056c742c7622c3973a4023
-
SHA256
4bad89428f866849e45904254b49dcb2eb4d780ebde5b61d2ca490b31d6269f2
-
SHA512
57621fdedeee9bc71a9d85340aa3c1ac73e36cc1ea4ba4da9bbfc199b7ccc2d811c287ac8489498933afc99be96c65fdd86b6c5ac371254c30b18a79794591da
-
SSDEEP
24576:hyCst2MPEGg9LijrW2Sr9Tafha5oSgTXc/OgmnWBn2qZMecxrD67:UCst2MPEGg9LX2Sr9TEhaqSkgnLBn2Mj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1