General
-
Target
7aa66cd0bcc76f6c85319b710936a95b952c85b9174972f2b0f06784eb9ee4cf
-
Size
1.1MB
-
Sample
241109-vsxthsxngy
-
MD5
1003bc90fe5d48bd554601f84568a802
-
SHA1
2b8dc7e2b5f7bd89f4958b9c3e4bda74ecd06d0b
-
SHA256
7aa66cd0bcc76f6c85319b710936a95b952c85b9174972f2b0f06784eb9ee4cf
-
SHA512
98a694515b1486a15b8387d5edadf15f447b2955cdf5321e62d1121fa4bcef4dbe925c0bdd76b005f82f5c0a79fd44beddefc13397cf21886d6cc5bc6ed62397
-
SSDEEP
24576:PybCM0IPU3csd3tyQFkAO0n9Dea4x3BzKNvYpSjTqtE0m2qS:aOM0Is3vqQFkh0nIJDOD0z
Static task
static1
Behavioral task
behavioral1
Sample
7aa66cd0bcc76f6c85319b710936a95b952c85b9174972f2b0f06784eb9ee4cf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
7aa66cd0bcc76f6c85319b710936a95b952c85b9174972f2b0f06784eb9ee4cf
-
Size
1.1MB
-
MD5
1003bc90fe5d48bd554601f84568a802
-
SHA1
2b8dc7e2b5f7bd89f4958b9c3e4bda74ecd06d0b
-
SHA256
7aa66cd0bcc76f6c85319b710936a95b952c85b9174972f2b0f06784eb9ee4cf
-
SHA512
98a694515b1486a15b8387d5edadf15f447b2955cdf5321e62d1121fa4bcef4dbe925c0bdd76b005f82f5c0a79fd44beddefc13397cf21886d6cc5bc6ed62397
-
SSDEEP
24576:PybCM0IPU3csd3tyQFkAO0n9Dea4x3BzKNvYpSjTqtE0m2qS:aOM0Is3vqQFkh0nIJDOD0z
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1