General

  • Target

    462aec704480f6bd6549210d9fe9b47b623dacbddf4814c307ac805135f3f6fe

  • Size

    713KB

  • Sample

    230818-1rdbdafh3y

  • MD5

    1da62613ed5dcab72539c4bb40a58381

  • SHA1

    c0e3a4f0ab530c5d577562da6b3e9f0cbdc3673c

  • SHA256

    462aec704480f6bd6549210d9fe9b47b623dacbddf4814c307ac805135f3f6fe

  • SHA512

    ea1ca40e73c3ef29003f371aa7a3f036b0cd2282725f84b6d5328fccf37b9eebcbd98ec3b67941eacd3100795f9532d301142ef8203fcc2e1ad4b8f26ffda94c

  • SSDEEP

    12288:oMrvy90WhaCFmMo8rArYYnj7DTaHnInZ8HZm6j8y7zj0czcEni:HyvaCFUuBO7uIZaZZV7zowzi

Malware Config

Extracted

Family

redline

Botnet

dugin

C2

77.91.124.73:19071

Attributes
  • auth_value

    7c3e46e091100fd26a6076996d374c28

Targets

    • Target

      462aec704480f6bd6549210d9fe9b47b623dacbddf4814c307ac805135f3f6fe

    • Size

      713KB

    • MD5

      1da62613ed5dcab72539c4bb40a58381

    • SHA1

      c0e3a4f0ab530c5d577562da6b3e9f0cbdc3673c

    • SHA256

      462aec704480f6bd6549210d9fe9b47b623dacbddf4814c307ac805135f3f6fe

    • SHA512

      ea1ca40e73c3ef29003f371aa7a3f036b0cd2282725f84b6d5328fccf37b9eebcbd98ec3b67941eacd3100795f9532d301142ef8203fcc2e1ad4b8f26ffda94c

    • SSDEEP

      12288:oMrvy90WhaCFmMo8rArYYnj7DTaHnInZ8HZm6j8y7zj0czcEni:HyvaCFUuBO7uIZaZZV7zowzi

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks