General
-
Target
d2cfd151e051e4cb827cb1e92c009ca1cb00fb20db1abe333dd2b0461e2e297eN.exe
-
Size
488KB
-
Sample
241205-ftprzawmdp
-
MD5
d0dc86ac5f753c9420f47ae68a157140
-
SHA1
34278187e6a86598e95afee09d791d44de05b34e
-
SHA256
d2cfd151e051e4cb827cb1e92c009ca1cb00fb20db1abe333dd2b0461e2e297e
-
SHA512
7b88310526700772ebd838b4ca9c917a6835ac4720c0018ab867ca4344038133f4959567956e698aa4511f46fc303670ee0de27b1bc956300b100c6fa2b7689e
-
SSDEEP
6144:KIy+bnr+Rp0yN90QEfP15epEzSHBjkZ8fEg06yZV+Bi89Xl5ARAX32jb/OdQzLVO:4Mrxy90L0H1nEgxyZI/1l5qDH3HVcG4
Static task
static1
Behavioral task
behavioral1
Sample
d2cfd151e051e4cb827cb1e92c009ca1cb00fb20db1abe333dd2b0461e2e297eN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
misik
217.196.96.102:4132
-
auth_value
9133827666bc8f4b05339316460b08aa
Targets
-
-
Target
d2cfd151e051e4cb827cb1e92c009ca1cb00fb20db1abe333dd2b0461e2e297eN.exe
-
Size
488KB
-
MD5
d0dc86ac5f753c9420f47ae68a157140
-
SHA1
34278187e6a86598e95afee09d791d44de05b34e
-
SHA256
d2cfd151e051e4cb827cb1e92c009ca1cb00fb20db1abe333dd2b0461e2e297e
-
SHA512
7b88310526700772ebd838b4ca9c917a6835ac4720c0018ab867ca4344038133f4959567956e698aa4511f46fc303670ee0de27b1bc956300b100c6fa2b7689e
-
SSDEEP
6144:KIy+bnr+Rp0yN90QEfP15epEzSHBjkZ8fEg06yZV+Bi89Xl5ARAX32jb/OdQzLVO:4Mrxy90L0H1nEgxyZI/1l5qDH3HVcG4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1