General
-
Target
b0c91ae24279ff6e466a3d4c7535f03be8c2e2a7acb158dfe3384b817a6f3a0f
-
Size
1.1MB
-
Sample
241111-a3wnzsygmf
-
MD5
c87a6863c7d0dbb0b757b862bce1d252
-
SHA1
cc52ad1fd94a251beddb996f26144dd5e2aad51a
-
SHA256
b0c91ae24279ff6e466a3d4c7535f03be8c2e2a7acb158dfe3384b817a6f3a0f
-
SHA512
10c916f8122cd977bbff61041c716ec76e675519b00f550193eca3cad8843bcff1687d8061b177fe3f7fa888c1be8154536d5b5b8a9b8c4ab4246e14ab97b864
-
SSDEEP
24576:8yQwYCKRigsiEOk0/aFkj27W+QCp0exEhmqeFh/jEsEqSI:rQwYAgsJ70/aFkappHEY/LEB
Static task
static1
Behavioral task
behavioral1
Sample
b0c91ae24279ff6e466a3d4c7535f03be8c2e2a7acb158dfe3384b817a6f3a0f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
b0c91ae24279ff6e466a3d4c7535f03be8c2e2a7acb158dfe3384b817a6f3a0f
-
Size
1.1MB
-
MD5
c87a6863c7d0dbb0b757b862bce1d252
-
SHA1
cc52ad1fd94a251beddb996f26144dd5e2aad51a
-
SHA256
b0c91ae24279ff6e466a3d4c7535f03be8c2e2a7acb158dfe3384b817a6f3a0f
-
SHA512
10c916f8122cd977bbff61041c716ec76e675519b00f550193eca3cad8843bcff1687d8061b177fe3f7fa888c1be8154536d5b5b8a9b8c4ab4246e14ab97b864
-
SSDEEP
24576:8yQwYCKRigsiEOk0/aFkj27W+QCp0exEhmqeFh/jEsEqSI:rQwYAgsJ70/aFkappHEY/LEB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1