General
-
Target
e0685a10bb69c5952b9c63181353a23771cfbfd3f6823111a9ee2259ed65806c
-
Size
1.1MB
-
Sample
241109-n9lz1stgqd
-
MD5
29ed9946f72410bc949585ed2f8c2678
-
SHA1
4b556a6bbe528faf80bdc4e609f2074e137783ba
-
SHA256
e0685a10bb69c5952b9c63181353a23771cfbfd3f6823111a9ee2259ed65806c
-
SHA512
13c9a48dddf4740b54a37442a1d710f26c3de53f52fa7616c745215a32a0eed4675d3af0b3c01d63f909b307d18eaebf81f5928a2826f00349e1ad9797a48623
-
SSDEEP
24576:PynRyo+QfigwFkmLgA0VrADLwhXPmydDO3jZh5aj9Tgt:anz+QfigwFkQg3L+WDOT352g
Static task
static1
Behavioral task
behavioral1
Sample
e0685a10bb69c5952b9c63181353a23771cfbfd3f6823111a9ee2259ed65806c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
e0685a10bb69c5952b9c63181353a23771cfbfd3f6823111a9ee2259ed65806c
-
Size
1.1MB
-
MD5
29ed9946f72410bc949585ed2f8c2678
-
SHA1
4b556a6bbe528faf80bdc4e609f2074e137783ba
-
SHA256
e0685a10bb69c5952b9c63181353a23771cfbfd3f6823111a9ee2259ed65806c
-
SHA512
13c9a48dddf4740b54a37442a1d710f26c3de53f52fa7616c745215a32a0eed4675d3af0b3c01d63f909b307d18eaebf81f5928a2826f00349e1ad9797a48623
-
SSDEEP
24576:PynRyo+QfigwFkmLgA0VrADLwhXPmydDO3jZh5aj9Tgt:anz+QfigwFkQg3L+WDOT352g
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1