General

  • Target

    48c062ad52b2964527e860dcb8f7d740abb6a8be6054389ec5835451aea55bb2

  • Size

    725KB

  • Sample

    230212-ccx58sae3w

  • MD5

    64b356fcbc24bb86295877301ae8ec33

  • SHA1

    6fdfd1b6497351be84303a701155e15942e4f4b0

  • SHA256

    48c062ad52b2964527e860dcb8f7d740abb6a8be6054389ec5835451aea55bb2

  • SHA512

    ef3af69fe1368b1f3cc71dafdbd8b05fc6d46e4158cbb9c6e11cc28e8c0043431f8229d79f416e31dd9b64229b053dcef37320a3dd8165246cfe17265d4cb950

  • SSDEEP

    12288:PMrDy90Hq/tUYiPIVQZL42Q5NofQWPeJhOkRw1qJPeXrsKdpGva+51CrXMH:kyEAgLH+NofQvhDw1qTl8A

Malware Config

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Targets

    • Target

      48c062ad52b2964527e860dcb8f7d740abb6a8be6054389ec5835451aea55bb2

    • Size

      725KB

    • MD5

      64b356fcbc24bb86295877301ae8ec33

    • SHA1

      6fdfd1b6497351be84303a701155e15942e4f4b0

    • SHA256

      48c062ad52b2964527e860dcb8f7d740abb6a8be6054389ec5835451aea55bb2

    • SHA512

      ef3af69fe1368b1f3cc71dafdbd8b05fc6d46e4158cbb9c6e11cc28e8c0043431f8229d79f416e31dd9b64229b053dcef37320a3dd8165246cfe17265d4cb950

    • SSDEEP

      12288:PMrDy90Hq/tUYiPIVQZL42Q5NofQWPeJhOkRw1qJPeXrsKdpGva+51CrXMH:kyEAgLH+NofQvhDw1qTl8A

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks