General
-
Target
6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e
-
Size
772KB
-
Sample
241111-czb7aa1ajq
-
MD5
723c46731434889ebf4131fc644b3a60
-
SHA1
47388a744e6c70213e53eab5a62cac414924f48f
-
SHA256
6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e
-
SHA512
1a3859b3e57dc41bdcda37a9a04fb6601e287b0e92c8d733ecd5aeda7bb24ef0b69572f920a657d0ab44d93a65003f21baf54fca98094a29e014ce716c79fc17
-
SSDEEP
24576:2yd7+PVlmm3JEvfqI7CerqbdTjNOPpiJOYb:FdiPSM6bqdTpOPpiv
Static task
static1
Behavioral task
behavioral1
Sample
6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
misik
217.196.96.102:4132
-
auth_value
9133827666bc8f4b05339316460b08aa
Targets
-
-
Target
6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e
-
Size
772KB
-
MD5
723c46731434889ebf4131fc644b3a60
-
SHA1
47388a744e6c70213e53eab5a62cac414924f48f
-
SHA256
6a3a0c7ebdf8b2c659cf22da296c4a8121e64123abc4f8383f2e6cccfe5c942e
-
SHA512
1a3859b3e57dc41bdcda37a9a04fb6601e287b0e92c8d733ecd5aeda7bb24ef0b69572f920a657d0ab44d93a65003f21baf54fca98094a29e014ce716c79fc17
-
SSDEEP
24576:2yd7+PVlmm3JEvfqI7CerqbdTjNOPpiJOYb:FdiPSM6bqdTpOPpiv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1