General
-
Target
138b12a61b355225f3f58e24129be621df2f25bd956282d0863d688102924c86
-
Size
1.1MB
-
Sample
241110-ssshpayng1
-
MD5
dd42ea4b50fe981b21dfad3ef57d00ac
-
SHA1
3d669fabb05229f6f548580a1068196fd39d5a89
-
SHA256
138b12a61b355225f3f58e24129be621df2f25bd956282d0863d688102924c86
-
SHA512
f9a8643e844b7be561a3d0dd516d57d2702e57cfd784289a3943e642b470e6406fed0b5e4bbd3d804e27befdd2144fba8887e0703b70c3e0a6419e2bf9fe069f
-
SSDEEP
24576:oyrQ8SDb5zg4FkaASxyZY+e9ceTSIm7mDlj41LaT9ftxb4U8:vrQ8SDb5U4FkaDxyZY+PuSP7mDl0wpfJ
Static task
static1
Behavioral task
behavioral1
Sample
138b12a61b355225f3f58e24129be621df2f25bd956282d0863d688102924c86.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
138b12a61b355225f3f58e24129be621df2f25bd956282d0863d688102924c86
-
Size
1.1MB
-
MD5
dd42ea4b50fe981b21dfad3ef57d00ac
-
SHA1
3d669fabb05229f6f548580a1068196fd39d5a89
-
SHA256
138b12a61b355225f3f58e24129be621df2f25bd956282d0863d688102924c86
-
SHA512
f9a8643e844b7be561a3d0dd516d57d2702e57cfd784289a3943e642b470e6406fed0b5e4bbd3d804e27befdd2144fba8887e0703b70c3e0a6419e2bf9fe069f
-
SSDEEP
24576:oyrQ8SDb5zg4FkaASxyZY+e9ceTSIm7mDlj41LaT9ftxb4U8:vrQ8SDb5U4FkaDxyZY+PuSP7mDl0wpfJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1