General
-
Target
91bc1b2fb04e2f8f7f8936c929ceebd6f716812fa1f9f555f309ef05aae1f507
-
Size
1.1MB
-
Sample
241111-l8994s1ncn
-
MD5
bb2e858cc3c31dc52ca942a5778593c0
-
SHA1
174bd3ce411197b4d3929720e0ba93278dbd4d45
-
SHA256
91bc1b2fb04e2f8f7f8936c929ceebd6f716812fa1f9f555f309ef05aae1f507
-
SHA512
56534db4204dfc2d01ff6f0127f7e834b6c49125c4cc7e0e1fbdabaa04a1c6dde0d85ea973b273f73faf9aa56d3d46a09e12bdac2d3c56357d38270052cc9d75
-
SSDEEP
24576:myW6dec+pbE9g9jLCIc0vsEXtoTmC/u77NvaK8T9Zd:1Hde3VE9g9gI99eGsZ
Static task
static1
Behavioral task
behavioral1
Sample
91bc1b2fb04e2f8f7f8936c929ceebd6f716812fa1f9f555f309ef05aae1f507.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
91bc1b2fb04e2f8f7f8936c929ceebd6f716812fa1f9f555f309ef05aae1f507
-
Size
1.1MB
-
MD5
bb2e858cc3c31dc52ca942a5778593c0
-
SHA1
174bd3ce411197b4d3929720e0ba93278dbd4d45
-
SHA256
91bc1b2fb04e2f8f7f8936c929ceebd6f716812fa1f9f555f309ef05aae1f507
-
SHA512
56534db4204dfc2d01ff6f0127f7e834b6c49125c4cc7e0e1fbdabaa04a1c6dde0d85ea973b273f73faf9aa56d3d46a09e12bdac2d3c56357d38270052cc9d75
-
SSDEEP
24576:myW6dec+pbE9g9jLCIc0vsEXtoTmC/u77NvaK8T9Zd:1Hde3VE9g9gI99eGsZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1