General
-
Target
7c96c8b235f8a0960a73929718d3e9bb3225232a6193ac9447a094a609315728.exe
-
Size
750KB
-
Sample
241119-v5la9aylhv
-
MD5
65b63c765a63b84bd38b05f2362e30e6
-
SHA1
5376358958d83e1a882cb14b724737c237f6d00c
-
SHA256
7c96c8b235f8a0960a73929718d3e9bb3225232a6193ac9447a094a609315728
-
SHA512
11c29a9acf773a89fa202cf554912ddcb2fb6b41c4543fe3d1ae74fab76d3accf54bd08a09400baa03bc0abefdd74c019f10dc9090e79532a917d7419abe9fca
-
SSDEEP
12288:YMrwy90QpG9cykzYC0El32F93lWXKcAm7bTET85JBVBZT1mIdMosyymU:Yy4nEp693loKcAmnTm8XzT8AMoHDU
Static task
static1
Behavioral task
behavioral1
Sample
7c96c8b235f8a0960a73929718d3e9bb3225232a6193ac9447a094a609315728.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
masta
185.161.248.75:4132
-
auth_value
57f23b6b74d0f680c5a0c8ac9f52bd75
Targets
-
-
Target
7c96c8b235f8a0960a73929718d3e9bb3225232a6193ac9447a094a609315728.exe
-
Size
750KB
-
MD5
65b63c765a63b84bd38b05f2362e30e6
-
SHA1
5376358958d83e1a882cb14b724737c237f6d00c
-
SHA256
7c96c8b235f8a0960a73929718d3e9bb3225232a6193ac9447a094a609315728
-
SHA512
11c29a9acf773a89fa202cf554912ddcb2fb6b41c4543fe3d1ae74fab76d3accf54bd08a09400baa03bc0abefdd74c019f10dc9090e79532a917d7419abe9fca
-
SSDEEP
12288:YMrwy90QpG9cykzYC0El32F93lWXKcAm7bTET85JBVBZT1mIdMosyymU:Yy4nEp693loKcAmnTm8XzT8AMoHDU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1