General

  • Target

    6609f481e9e0e7b3bc74f7fe524b51aaf547d7dc9e1fdcfd40082390e8acc7e5

  • Size

    697KB

  • Sample

    230921-nzne4afg81

  • MD5

    f89173f190c61fb0d2afebeffdc6748d

  • SHA1

    abd3f9607c0a93a1b11eeed3ba3bfae9d44bef83

  • SHA256

    6609f481e9e0e7b3bc74f7fe524b51aaf547d7dc9e1fdcfd40082390e8acc7e5

  • SHA512

    2e1df61d37722095c92f6fb9d569aa3d24d628082ee19811ca489e09fd692af7d20d0b0066e631d6f936e7ea3d884ddd0d989f9771884f3dfde9085f10b5d95e

  • SSDEEP

    12288:FMr/y90dO6xT51DPP9Gb2Ogo7PIkM2L7sURvjaZVF4C88Tj1mqF7qla98aH4:6yKG2boMn2tMz4C3Qqp4

Malware Config

Extracted

Family

redline

Botnet

buben

C2

77.91.124.82:19071

Attributes
  • auth_value

    c62fa04aa45f5b78f62d2c21fcbefdec

Targets

    • Target

      6609f481e9e0e7b3bc74f7fe524b51aaf547d7dc9e1fdcfd40082390e8acc7e5

    • Size

      697KB

    • MD5

      f89173f190c61fb0d2afebeffdc6748d

    • SHA1

      abd3f9607c0a93a1b11eeed3ba3bfae9d44bef83

    • SHA256

      6609f481e9e0e7b3bc74f7fe524b51aaf547d7dc9e1fdcfd40082390e8acc7e5

    • SHA512

      2e1df61d37722095c92f6fb9d569aa3d24d628082ee19811ca489e09fd692af7d20d0b0066e631d6f936e7ea3d884ddd0d989f9771884f3dfde9085f10b5d95e

    • SSDEEP

      12288:FMr/y90dO6xT51DPP9Gb2Ogo7PIkM2L7sURvjaZVF4C88Tj1mqF7qla98aH4:6yKG2boMn2tMz4C3Qqp4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks