General
-
Target
a7663d3388687401afaa5804b3143d7a3e35f3fd3eab206d3d238fa33549967f
-
Size
1.1MB
-
Sample
241109-qkkf1avflc
-
MD5
11ec46231f10c8613e6b28424c16de5c
-
SHA1
bb9a6e7988fc99bf47fc5655f5ca1aa4566831ce
-
SHA256
a7663d3388687401afaa5804b3143d7a3e35f3fd3eab206d3d238fa33549967f
-
SHA512
59157775976e741eccb9aeb6dc95274e01656d71739150063b68fcdfc633cc09594b15de1004aaf50397cf332d70c5be4d50f502aeab43b7252f6de0f26eb134
-
SSDEEP
24576:+yRct+elKQ3AjETg9sO2fBfQ6BVFY+4CDROqsyq6yHU+GW/t:NRct5lKUeETg9sOSBLBLgCTdyHU+l
Static task
static1
Behavioral task
behavioral1
Sample
a7663d3388687401afaa5804b3143d7a3e35f3fd3eab206d3d238fa33549967f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
a7663d3388687401afaa5804b3143d7a3e35f3fd3eab206d3d238fa33549967f
-
Size
1.1MB
-
MD5
11ec46231f10c8613e6b28424c16de5c
-
SHA1
bb9a6e7988fc99bf47fc5655f5ca1aa4566831ce
-
SHA256
a7663d3388687401afaa5804b3143d7a3e35f3fd3eab206d3d238fa33549967f
-
SHA512
59157775976e741eccb9aeb6dc95274e01656d71739150063b68fcdfc633cc09594b15de1004aaf50397cf332d70c5be4d50f502aeab43b7252f6de0f26eb134
-
SSDEEP
24576:+yRct+elKQ3AjETg9sO2fBfQ6BVFY+4CDROqsyq6yHU+GW/t:NRct5lKUeETg9sOSBLBLgCTdyHU+l
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1