General

  • Target

    16b9fe8be5545f10b60ab9a7f49d1c85772ffcab517d7d29d187254cdaf51b12

  • Size

    1.1MB

  • Sample

    231002-mmb1vsha6x

  • MD5

    65019e71629befc754c786df5d9d74bf

  • SHA1

    f00568f5b33e6b95239d251df2a52e2960f58523

  • SHA256

    16b9fe8be5545f10b60ab9a7f49d1c85772ffcab517d7d29d187254cdaf51b12

  • SHA512

    e06f9f25f1c52289694d3d2bad56f5b4426bf9b9d6f9200457b180fc0ecadfc459ef891950ff428191b54bdf9d727e3f1294119ba338252d4f2af2a1199823f1

  • SSDEEP

    24576:gy6508M+ERPt79ZmMEm2qFazE8fYneskMEm1e7/XW:n65g+SRVhxFaz3YneV2Y

Malware Config

Extracted

Family

redline

Botnet

larek

C2

77.91.124.55:19071

Targets

    • Target

      16b9fe8be5545f10b60ab9a7f49d1c85772ffcab517d7d29d187254cdaf51b12

    • Size

      1.1MB

    • MD5

      65019e71629befc754c786df5d9d74bf

    • SHA1

      f00568f5b33e6b95239d251df2a52e2960f58523

    • SHA256

      16b9fe8be5545f10b60ab9a7f49d1c85772ffcab517d7d29d187254cdaf51b12

    • SHA512

      e06f9f25f1c52289694d3d2bad56f5b4426bf9b9d6f9200457b180fc0ecadfc459ef891950ff428191b54bdf9d727e3f1294119ba338252d4f2af2a1199823f1

    • SSDEEP

      24576:gy6508M+ERPt79ZmMEm2qFazE8fYneskMEm1e7/XW:n65g+SRVhxFaz3YneV2Y

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks