General
-
Target
664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe
-
Size
305KB
-
Sample
250201-29xy6swqhq
-
MD5
021f8fd16d8adc206e585df6bb6ad0c0
-
SHA1
bca4a533e484080e2078293c4f444fbd689cc074
-
SHA256
664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2
-
SHA512
7e438c50a21de440fc819c59745e3896f27331afc8a752df5a7fa37a90f9f2bdf40341f65a7872af06441d01d0beed295cf53dc417b2b85b5f950ddac0b19717
-
SSDEEP
6144:Kry+bnr+Up0yN90QE0B1o+MEtE/SxTi7KKJFAIkCoFdUd:FMrky90+BgII3AIkCori
Static task
static1
Behavioral task
behavioral1
Sample
664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
redline
messi
185.161.248.75:4132
-
auth_value
b602b28664bb738e322d37baab91db28
Targets
-
-
Target
664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2N.exe
-
Size
305KB
-
MD5
021f8fd16d8adc206e585df6bb6ad0c0
-
SHA1
bca4a533e484080e2078293c4f444fbd689cc074
-
SHA256
664ac4c9ff82d8d92a4db78ad4e561275f0f8e4cfc64b2240896ebaef5ff27c2
-
SHA512
7e438c50a21de440fc819c59745e3896f27331afc8a752df5a7fa37a90f9f2bdf40341f65a7872af06441d01d0beed295cf53dc417b2b85b5f950ddac0b19717
-
SSDEEP
6144:Kry+bnr+Up0yN90QE0B1o+MEtE/SxTi7KKJFAIkCoFdUd:FMrky90+BgII3AIkCori
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4