General
-
Target
41e0eac2cb5e52222d91a27c0c26b7283321bc9e329126fbba1fa30b70ef9141
-
Size
1.1MB
-
Sample
241110-1njc8awbml
-
MD5
a392627dc118160e51286076a7f64999
-
SHA1
e145f5cc5b1818be16907dce532b6a1f92fd19dc
-
SHA256
41e0eac2cb5e52222d91a27c0c26b7283321bc9e329126fbba1fa30b70ef9141
-
SHA512
04bdc0bbfdfcb7a267be16090b074c41fa6445a8ac96d5ad897ecd95f20b8b9ca84f3ddf848bf78f8b64254f68e29c5248b695dcdcdc26f83e8712bc44d79d0a
-
SSDEEP
24576:Ky9fJ8nAWXBVnnp+JnMsdpYZH8l2IWdUvRu519CmTMDkusc:R9fJ7WXnp+JnMQq25A9xMDQ
Static task
static1
Behavioral task
behavioral1
Sample
41e0eac2cb5e52222d91a27c0c26b7283321bc9e329126fbba1fa30b70ef9141.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
dogma
185.161.248.75:4132
-
auth_value
d6c5d36e9aa03c956dc76aa0fcbe3639
Targets
-
-
Target
41e0eac2cb5e52222d91a27c0c26b7283321bc9e329126fbba1fa30b70ef9141
-
Size
1.1MB
-
MD5
a392627dc118160e51286076a7f64999
-
SHA1
e145f5cc5b1818be16907dce532b6a1f92fd19dc
-
SHA256
41e0eac2cb5e52222d91a27c0c26b7283321bc9e329126fbba1fa30b70ef9141
-
SHA512
04bdc0bbfdfcb7a267be16090b074c41fa6445a8ac96d5ad897ecd95f20b8b9ca84f3ddf848bf78f8b64254f68e29c5248b695dcdcdc26f83e8712bc44d79d0a
-
SSDEEP
24576:Ky9fJ8nAWXBVnnp+JnMsdpYZH8l2IWdUvRu519CmTMDkusc:R9fJ7WXnp+JnMQq25A9xMDQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1