General

  • Target

    b3d6aa2dbf077f6f31b0211ea8efdafd.bin

  • Size

    785KB

  • Sample

    230821-b7c8waab95

  • MD5

    ae6cf578f94839944c5b1b40fc38eefb

  • SHA1

    4017741d9fab93d39fdd8d96e65798f91d2bfe8d

  • SHA256

    749d98de68d53f50927611c4fd976db5d9b3e0d2c4c88f0e6835cae77fc0d46e

  • SHA512

    b29d0776837325a48d31f79bf41e5d2b35561f6763fe5a378d7d245b964a42384d0ee20953e29f38297a003f4d64de5380f5a70193ac966e4fd35a162ffdcac2

  • SSDEEP

    24576:pcsAn8vrYAsER9Rmh79h1+J4mfJ/fL0uWGDB:pcm0xEzgBh1+Gmd/DB

Malware Config

Extracted

Family

redline

Botnet

dugin

C2

77.91.124.73:19071

Attributes
  • auth_value

    7c3e46e091100fd26a6076996d374c28

Targets

    • Target

      1b4d67523602523fb1ae985471afd79a19e21c87143c9b2535c635bb7d8e0611.exe

    • Size

      829KB

    • MD5

      b3d6aa2dbf077f6f31b0211ea8efdafd

    • SHA1

      9b9a005fbcf49e634c414ab7b02833849d6d2a40

    • SHA256

      1b4d67523602523fb1ae985471afd79a19e21c87143c9b2535c635bb7d8e0611

    • SHA512

      7fbeb562635ab2a76decf122275d4a5ce5d97b339cd3c8bf0ce54f9f3e7e0042ba0ace1f97429e4ee29065239c18003b81acf5922417f2598e2b37c4592c4f16

    • SSDEEP

      12288:MMrry90eW8U0cWbBG0NA8xdFvDz+BwCP0iIYgJnydFtt88DQVLR5VCV4UPJv:Hyw8JcW40O871um4jfgdqy9uht

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks