General
-
Target
430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2
-
Size
1.1MB
-
Sample
241110-vhe6qatqhl
-
MD5
049e24379b92f63ee3b12ab3e4a97237
-
SHA1
60118ab476ad60139f5c4d282609e041a7528121
-
SHA256
430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2
-
SHA512
aae41e4d3bc957e543d4013b35cb1ca66a11191c52a3985482450819a561989f7956fc8cea8648b77d827c0ddadeaccd62eb75f67e01ea71360925257929d778
-
SSDEEP
24576:3ykAw+oiEcgHcpFkH/jva74B1x7Q53Ltom9Fs+d:C6t1HcpFkH7q4B1xQ9L79O+
Static task
static1
Behavioral task
behavioral1
Sample
430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2
-
Size
1.1MB
-
MD5
049e24379b92f63ee3b12ab3e4a97237
-
SHA1
60118ab476ad60139f5c4d282609e041a7528121
-
SHA256
430098ac4c3d5041a8a2f7ff151a148db61f07eccac7f2f640386574ac4f57c2
-
SHA512
aae41e4d3bc957e543d4013b35cb1ca66a11191c52a3985482450819a561989f7956fc8cea8648b77d827c0ddadeaccd62eb75f67e01ea71360925257929d778
-
SSDEEP
24576:3ykAw+oiEcgHcpFkH/jva74B1x7Q53Ltom9Fs+d:C6t1HcpFkH7q4B1xQ9L79O+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1