General
-
Target
48462423d033cd4c36d47fe45adb6030605ce27f6cdf6226487472fa548fbd9b
-
Size
769KB
-
Sample
241110-zz4b4awakc
-
MD5
e31e2b619f14b96fbeca5c0379abc3c7
-
SHA1
d733a8e43e84f4b73bc281a4d58cc8bafa14e6a5
-
SHA256
48462423d033cd4c36d47fe45adb6030605ce27f6cdf6226487472fa548fbd9b
-
SHA512
77d68d96d98e792f20b36270e3c13992839668cba8050a049d84cc5944848f5495bf5fee962ba7c4c16816d68963c8555b1c43cea59b6e690df6fa8fa81518d1
-
SSDEEP
24576:LyCwcZpKnW7cEKm53VKxnCF+VUXJran6aMd:+uZpKnW7+EKxnCFxJrDh
Static task
static1
Behavioral task
behavioral1
Sample
48462423d033cd4c36d47fe45adb6030605ce27f6cdf6226487472fa548fbd9b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
48462423d033cd4c36d47fe45adb6030605ce27f6cdf6226487472fa548fbd9b
-
Size
769KB
-
MD5
e31e2b619f14b96fbeca5c0379abc3c7
-
SHA1
d733a8e43e84f4b73bc281a4d58cc8bafa14e6a5
-
SHA256
48462423d033cd4c36d47fe45adb6030605ce27f6cdf6226487472fa548fbd9b
-
SHA512
77d68d96d98e792f20b36270e3c13992839668cba8050a049d84cc5944848f5495bf5fee962ba7c4c16816d68963c8555b1c43cea59b6e690df6fa8fa81518d1
-
SSDEEP
24576:LyCwcZpKnW7cEKm53VKxnCF+VUXJran6aMd:+uZpKnW7+EKxnCFxJrDh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1