General
-
Target
0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6
-
Size
1.1MB
-
Sample
241111-h8qzpawclg
-
MD5
29a60a73b71010c9370df68692f4b360
-
SHA1
d070590b17d00a08ed9a42bbd04ee0cfaa984f05
-
SHA256
0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6
-
SHA512
cb020a4e33fd599847b02074626d8bda848f95c3c770f99d5d97eecda1b64df2a1d645270543acc735382e4f08f47172f58a6048d6b801bfa1772eb61710ed90
-
SSDEEP
24576:Tyzt2ORC7Jr+Fk/p7pXyUp+TtL6aQVfjdBctqbXgKupamng:mh2O07V+FkBNMnQJjditqDgP
Static task
static1
Behavioral task
behavioral1
Sample
0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6
-
Size
1.1MB
-
MD5
29a60a73b71010c9370df68692f4b360
-
SHA1
d070590b17d00a08ed9a42bbd04ee0cfaa984f05
-
SHA256
0a219d81c1390fb28a01821873f7191e470d1dce57a352d84d9023f21b6ce2d6
-
SHA512
cb020a4e33fd599847b02074626d8bda848f95c3c770f99d5d97eecda1b64df2a1d645270543acc735382e4f08f47172f58a6048d6b801bfa1772eb61710ed90
-
SSDEEP
24576:Tyzt2ORC7Jr+Fk/p7pXyUp+TtL6aQVfjdBctqbXgKupamng:mh2O07V+FkBNMnQJjditqDgP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1