General
-
Target
d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10
-
Size
1.1MB
-
Sample
241110-3jpesawrey
-
MD5
343052f390d293ecabe995a70836c0dd
-
SHA1
6444fa46a5047447304638cf64eedbbab630060c
-
SHA256
d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10
-
SHA512
1258817059c1bd1b86fd87dd6f5995d4e39e2391c362789655956ca05a9a545ec5be5c241722b0a6521fe270da10b3eb4766fb6c980dc46380ae102f5628ee7f
-
SSDEEP
24576:uyTSI0CHFCgFktR/LwVMsv9D5vKzx2QNg+m:9GykgFkr/LjsvmxD
Static task
static1
Behavioral task
behavioral1
Sample
d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10
-
Size
1.1MB
-
MD5
343052f390d293ecabe995a70836c0dd
-
SHA1
6444fa46a5047447304638cf64eedbbab630060c
-
SHA256
d947b533d06ba7324b0c3eacb1334f4ebe66c74995b16cb15c7a8a22f7ab3b10
-
SHA512
1258817059c1bd1b86fd87dd6f5995d4e39e2391c362789655956ca05a9a545ec5be5c241722b0a6521fe270da10b3eb4766fb6c980dc46380ae102f5628ee7f
-
SSDEEP
24576:uyTSI0CHFCgFktR/LwVMsv9D5vKzx2QNg+m:9GykgFkr/LjsvmxD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1