General
-
Target
45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945
-
Size
1.1MB
-
Sample
241109-ntdzgasqct
-
MD5
49c33b85a84e9821d5674350710c92b8
-
SHA1
2791f5b5c3cbcdb1a1b735ca89c07b6db3de033a
-
SHA256
45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945
-
SHA512
88cb5343d0fbf28ec013888e46b105920bbac8bf87c9081ba47046bd388e2ff9f0dde43dcbbb46b6bef705e3cdbf562f95f0dc018f2374ef85758ae8155d0da4
-
SSDEEP
24576:byWduDG1KS/hWuFkptd6NFfxjNQwvrERMK8xuECxiD:OquDGUSouFkrkNPNGxw9Cx
Static task
static1
Behavioral task
behavioral1
Sample
45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945
-
Size
1.1MB
-
MD5
49c33b85a84e9821d5674350710c92b8
-
SHA1
2791f5b5c3cbcdb1a1b735ca89c07b6db3de033a
-
SHA256
45533f0e97d182027461de3421456a7bef5b37315d494b4c1b6139f0cc7c7945
-
SHA512
88cb5343d0fbf28ec013888e46b105920bbac8bf87c9081ba47046bd388e2ff9f0dde43dcbbb46b6bef705e3cdbf562f95f0dc018f2374ef85758ae8155d0da4
-
SSDEEP
24576:byWduDG1KS/hWuFkptd6NFfxjNQwvrERMK8xuECxiD:OquDGUSouFkrkNPNGxw9Cx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1