General
-
Target
419792b0c9e580a3bd4dc8f882a8621bcc60ae213b0cc781812775c75453e3bf
-
Size
1.1MB
-
Sample
241109-n799tstgnh
-
MD5
13f34d22d76d7dc41c94fd55caa78066
-
SHA1
d5588162edbdf5d78f7bae2af854c7d7191aff89
-
SHA256
419792b0c9e580a3bd4dc8f882a8621bcc60ae213b0cc781812775c75453e3bf
-
SHA512
8c5008d53aa48981eb56853c17e0a21e1b6211758e95edf2b54f50cfe7e3ba69e79f439b61c8a72c6f122ef3665d27b50ebcad7e7ae0464cf59fa1b2efe14ff3
-
SSDEEP
24576:KypBZaB9ZEDlq1FkyhtJmT/c5ETtjZjrT/A9GoQPi7nv6MCd:RtaB11FkvLJY9GM7v
Static task
static1
Behavioral task
behavioral1
Sample
419792b0c9e580a3bd4dc8f882a8621bcc60ae213b0cc781812775c75453e3bf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
419792b0c9e580a3bd4dc8f882a8621bcc60ae213b0cc781812775c75453e3bf
-
Size
1.1MB
-
MD5
13f34d22d76d7dc41c94fd55caa78066
-
SHA1
d5588162edbdf5d78f7bae2af854c7d7191aff89
-
SHA256
419792b0c9e580a3bd4dc8f882a8621bcc60ae213b0cc781812775c75453e3bf
-
SHA512
8c5008d53aa48981eb56853c17e0a21e1b6211758e95edf2b54f50cfe7e3ba69e79f439b61c8a72c6f122ef3665d27b50ebcad7e7ae0464cf59fa1b2efe14ff3
-
SSDEEP
24576:KypBZaB9ZEDlq1FkyhtJmT/c5ETtjZjrT/A9GoQPi7nv6MCd:RtaB11FkvLJY9GM7v
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1