General
-
Target
1967152872436f4ed9b38275d2dac98199c2ff1f473e1eac47a281c060926e0d
-
Size
1.1MB
-
Sample
241110-j4zlpstbka
-
MD5
5eaaa24dceadaa18668e1fb6ff6a84df
-
SHA1
44a1a8ba0d8554dd4da8052fefda51982c39c80d
-
SHA256
1967152872436f4ed9b38275d2dac98199c2ff1f473e1eac47a281c060926e0d
-
SHA512
a6083359b11e8f28d9fbdc46ca34af016cee8c289564c47fac552f2eb298b63a57f1230b34daeebd8213c2560ec4fc48eb4923bb07faa660884bfb2a75f011d6
-
SSDEEP
24576:iyZfA8Wxe43bE0g9M0UoImR/2ms5lXhT8VKZ91jMd/B:JS5s0E0g9M0UMpO58VK/1gd
Static task
static1
Behavioral task
behavioral1
Sample
1967152872436f4ed9b38275d2dac98199c2ff1f473e1eac47a281c060926e0d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
1967152872436f4ed9b38275d2dac98199c2ff1f473e1eac47a281c060926e0d
-
Size
1.1MB
-
MD5
5eaaa24dceadaa18668e1fb6ff6a84df
-
SHA1
44a1a8ba0d8554dd4da8052fefda51982c39c80d
-
SHA256
1967152872436f4ed9b38275d2dac98199c2ff1f473e1eac47a281c060926e0d
-
SHA512
a6083359b11e8f28d9fbdc46ca34af016cee8c289564c47fac552f2eb298b63a57f1230b34daeebd8213c2560ec4fc48eb4923bb07faa660884bfb2a75f011d6
-
SSDEEP
24576:iyZfA8Wxe43bE0g9M0UoImR/2ms5lXhT8VKZ91jMd/B:JS5s0E0g9M0UMpO58VK/1gd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1