General
-
Target
7ad1216222967a5e2974a92444c06874a03b6e2545158ef4d1aa5a1523d8068d
-
Size
1.1MB
-
Sample
241109-nh98jasng1
-
MD5
9c96a76c24c5f953bcef0adfa6792940
-
SHA1
08030f52da1c23db2e16f5b0f8e7cd6939a8fe98
-
SHA256
7ad1216222967a5e2974a92444c06874a03b6e2545158ef4d1aa5a1523d8068d
-
SHA512
345c8f613e1a15bf861f80ff81253aa5e7fe36afa1af94ea3a1eb38f85519d6599c0938530cfbad9f74fe8c93e60b00a3a05d0a9b2b36e3cc2020bb396f30ed6
-
SSDEEP
24576:Dy9lvhILZCk7vm/8FkbK4G4yxJSEwgPhMmLEj7Tm0xYMD:Wnvh4hi8FkD6wEhbEPa
Static task
static1
Behavioral task
behavioral1
Sample
7ad1216222967a5e2974a92444c06874a03b6e2545158ef4d1aa5a1523d8068d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
7ad1216222967a5e2974a92444c06874a03b6e2545158ef4d1aa5a1523d8068d
-
Size
1.1MB
-
MD5
9c96a76c24c5f953bcef0adfa6792940
-
SHA1
08030f52da1c23db2e16f5b0f8e7cd6939a8fe98
-
SHA256
7ad1216222967a5e2974a92444c06874a03b6e2545158ef4d1aa5a1523d8068d
-
SHA512
345c8f613e1a15bf861f80ff81253aa5e7fe36afa1af94ea3a1eb38f85519d6599c0938530cfbad9f74fe8c93e60b00a3a05d0a9b2b36e3cc2020bb396f30ed6
-
SSDEEP
24576:Dy9lvhILZCk7vm/8FkbK4G4yxJSEwgPhMmLEj7Tm0xYMD:Wnvh4hi8FkD6wEhbEPa
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1