General
-
Target
37b8dbef36614dcb5fd1adbc5475697dfa171f268610bcdc5edefa2946962582
-
Size
1.1MB
-
Sample
241110-q6jrla1mdk
-
MD5
c8fa3bab0dd39fd5d7cd2c7ea87c0065
-
SHA1
f72e7823079ce75859f123593239b18b5e01bff2
-
SHA256
37b8dbef36614dcb5fd1adbc5475697dfa171f268610bcdc5edefa2946962582
-
SHA512
3410e28379b1df8dcd01d24e1039da83e85fa530b40fdd2baea2f96912e517b5adaead2e81f2261a44ccbe9339f6a4b78a382a94745cd8c6703db9824c388734
-
SSDEEP
24576:Gy3pkwhVZoD+xTtmYEgWtr5FkxvHmc91TULv12dP/Wu2qjNJ:V3pkwhVZoKR8Dtr5FkhH71ILv12dW
Static task
static1
Behavioral task
behavioral1
Sample
37b8dbef36614dcb5fd1adbc5475697dfa171f268610bcdc5edefa2946962582.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
37b8dbef36614dcb5fd1adbc5475697dfa171f268610bcdc5edefa2946962582
-
Size
1.1MB
-
MD5
c8fa3bab0dd39fd5d7cd2c7ea87c0065
-
SHA1
f72e7823079ce75859f123593239b18b5e01bff2
-
SHA256
37b8dbef36614dcb5fd1adbc5475697dfa171f268610bcdc5edefa2946962582
-
SHA512
3410e28379b1df8dcd01d24e1039da83e85fa530b40fdd2baea2f96912e517b5adaead2e81f2261a44ccbe9339f6a4b78a382a94745cd8c6703db9824c388734
-
SSDEEP
24576:Gy3pkwhVZoD+xTtmYEgWtr5FkxvHmc91TULv12dP/Wu2qjNJ:V3pkwhVZoKR8Dtr5FkhH71ILv12dW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1