General
-
Target
c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2
-
Size
1.1MB
-
Sample
241110-qxpaqa1keq
-
MD5
734d5c6de2a90c1cb9a277de49c6056b
-
SHA1
2703adb2643c72a0b6e70f7eeb11fc8e73539776
-
SHA256
c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2
-
SHA512
af3cb918843239781f147114601d7129f767dd409d9f1a8361644f905c2378f8f5ec999baeefce3858d64a48f00d9b0ed2629041f7230b83f75d3cceb0acb840
-
SSDEEP
24576:qyFuSgO9UAl3jfiFkDnWKR2Fh6n8vze+5D/dgL6L4KnadU5g:xFu1O9UOjfiFkDWKILe+5D+L68KnaG
Static task
static1
Behavioral task
behavioral1
Sample
c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2
-
Size
1.1MB
-
MD5
734d5c6de2a90c1cb9a277de49c6056b
-
SHA1
2703adb2643c72a0b6e70f7eeb11fc8e73539776
-
SHA256
c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2
-
SHA512
af3cb918843239781f147114601d7129f767dd409d9f1a8361644f905c2378f8f5ec999baeefce3858d64a48f00d9b0ed2629041f7230b83f75d3cceb0acb840
-
SSDEEP
24576:qyFuSgO9UAl3jfiFkDnWKR2Fh6n8vze+5D/dgL6L4KnadU5g:xFu1O9UOjfiFkDWKILe+5D+L68KnaG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1