General
-
Target
b9a329a9a6480c6bed7a2b9a1edd64cd809a24d1a60fb92673196407f2f4e9bc
-
Size
1.1MB
-
Sample
241109-tr3spsxfqe
-
MD5
57da9d585d41c86ef3f626179430ba2a
-
SHA1
1d4ffab9c098fe069705666ca1dc88d84e3a58fc
-
SHA256
b9a329a9a6480c6bed7a2b9a1edd64cd809a24d1a60fb92673196407f2f4e9bc
-
SHA512
116e85a0ac18fcdd4ba1e90325e6e3a36ecf12c7471a99b2aa32e9f2c77ba9e75a92b280c54936b65bb1ecf71c17b2346908aac81a3932f67a5e036727fc8ead
-
SSDEEP
24576:pyEtlMW4iX7gLFkPXhapSlmBd0nPPeuIhH8OrcTGSta8uWt:cwpmLFkPXSFg+hH8mya8uW
Static task
static1
Behavioral task
behavioral1
Sample
b9a329a9a6480c6bed7a2b9a1edd64cd809a24d1a60fb92673196407f2f4e9bc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
b9a329a9a6480c6bed7a2b9a1edd64cd809a24d1a60fb92673196407f2f4e9bc
-
Size
1.1MB
-
MD5
57da9d585d41c86ef3f626179430ba2a
-
SHA1
1d4ffab9c098fe069705666ca1dc88d84e3a58fc
-
SHA256
b9a329a9a6480c6bed7a2b9a1edd64cd809a24d1a60fb92673196407f2f4e9bc
-
SHA512
116e85a0ac18fcdd4ba1e90325e6e3a36ecf12c7471a99b2aa32e9f2c77ba9e75a92b280c54936b65bb1ecf71c17b2346908aac81a3932f67a5e036727fc8ead
-
SSDEEP
24576:pyEtlMW4iX7gLFkPXhapSlmBd0nPPeuIhH8OrcTGSta8uWt:cwpmLFkPXSFg+hH8mya8uW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1