General
-
Target
807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe
-
Size
305KB
-
Sample
250208-aml5lswndn
-
MD5
5c24587733cc0d4f5c3678f1c0d33270
-
SHA1
ccbf39baf7d376cb8034835e863167b2368b598d
-
SHA256
807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59
-
SHA512
811e983bfcc299e0967b7121e97fb8cbbf3f7ebf7952dc2b04cd832dfc420db9c0619084f53c1434f1ff8a34a81a5c50bba05e04fb716ee9f4e16406d812715d
-
SSDEEP
6144:KNy+bnr+Qp0yN90QENBc1K9QBiwyhULM/0/J/uClXItQi98e7kXuzz/K:vMrIy90nq1WQB+i/B/lYtMmK
Static task
static1
Behavioral task
behavioral1
Sample
807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
redline
muza
185.161.248.75:4132
-
auth_value
99f39e1ac98e0c0a729ab27594e72bc3
Targets
-
-
Target
807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59N.exe
-
Size
305KB
-
MD5
5c24587733cc0d4f5c3678f1c0d33270
-
SHA1
ccbf39baf7d376cb8034835e863167b2368b598d
-
SHA256
807d3d0819b6de19ae75c283cea664d8f8668e26992a66f152750cb4006faf59
-
SHA512
811e983bfcc299e0967b7121e97fb8cbbf3f7ebf7952dc2b04cd832dfc420db9c0619084f53c1434f1ff8a34a81a5c50bba05e04fb716ee9f4e16406d812715d
-
SSDEEP
6144:KNy+bnr+Qp0yN90QENBc1K9QBiwyhULM/0/J/uClXItQi98e7kXuzz/K:vMrIy90nq1WQB+i/B/lYtMmK
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4