General
-
Target
f3144e4493f32daac119e9ed9e0c255b9f0ff0692637e5d1ec22fe71d81ea13e
-
Size
1.1MB
-
Sample
241109-qnwy7stqhw
-
MD5
071feca611d3bee4d94a8bfd032de5a3
-
SHA1
e00811b2f5bdca6a2395ded7a2a2ec8d00ce280e
-
SHA256
f3144e4493f32daac119e9ed9e0c255b9f0ff0692637e5d1ec22fe71d81ea13e
-
SHA512
587d147e313a9343573b48e92487683d00be1a6187363b9c4f9a950cfb7ba74166a13fd463477e22bafe0d7384a8b3774213efa179ceabe0afd9ec092f3ef5e8
-
SSDEEP
24576:dy7jjM6HFuFk0LhVfNGsrMCtz8OLM9nmztzZ7X8dwo:47nMQuFk0Lh5NGsrMO1g9mxzhX8i
Static task
static1
Behavioral task
behavioral1
Sample
f3144e4493f32daac119e9ed9e0c255b9f0ff0692637e5d1ec22fe71d81ea13e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
f3144e4493f32daac119e9ed9e0c255b9f0ff0692637e5d1ec22fe71d81ea13e
-
Size
1.1MB
-
MD5
071feca611d3bee4d94a8bfd032de5a3
-
SHA1
e00811b2f5bdca6a2395ded7a2a2ec8d00ce280e
-
SHA256
f3144e4493f32daac119e9ed9e0c255b9f0ff0692637e5d1ec22fe71d81ea13e
-
SHA512
587d147e313a9343573b48e92487683d00be1a6187363b9c4f9a950cfb7ba74166a13fd463477e22bafe0d7384a8b3774213efa179ceabe0afd9ec092f3ef5e8
-
SSDEEP
24576:dy7jjM6HFuFk0LhVfNGsrMCtz8OLM9nmztzZ7X8dwo:47nMQuFk0Lh5NGsrMO1g9mxzhX8i
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1