General

  • Target

    6bab8ba70e8dd60254f338660b9c94a72324daee414de38702f2f2ce6c89d933

  • Size

    784KB

  • Sample

    231012-jlrhdagg73

  • MD5

    08c005f2a6c0b4c8d2a4cc4b898411e4

  • SHA1

    cecfe2edc76e25bef2e88a6f81289c69ca69ba5a

  • SHA256

    6bab8ba70e8dd60254f338660b9c94a72324daee414de38702f2f2ce6c89d933

  • SHA512

    0ce1091d52dc1d1f21fc9b4e590e50503369610007c6f0105a1f70670f4ea7b50db10f15d8029dd7cb3009ae280ad1cbbd016ea6cef27bee887074f785243166

  • SSDEEP

    24576:Py/d2Uxd6+hYwp4jNlDJj7Rb4w2YWsXGJAaU:a12UP6+hu3DHAYxk

Malware Config

Extracted

Family

redline

Botnet

buben

C2

77.91.124.82:19071

Attributes
  • auth_value

    c62fa04aa45f5b78f62d2c21fcbefdec

Targets

    • Target

      6bab8ba70e8dd60254f338660b9c94a72324daee414de38702f2f2ce6c89d933

    • Size

      784KB

    • MD5

      08c005f2a6c0b4c8d2a4cc4b898411e4

    • SHA1

      cecfe2edc76e25bef2e88a6f81289c69ca69ba5a

    • SHA256

      6bab8ba70e8dd60254f338660b9c94a72324daee414de38702f2f2ce6c89d933

    • SHA512

      0ce1091d52dc1d1f21fc9b4e590e50503369610007c6f0105a1f70670f4ea7b50db10f15d8029dd7cb3009ae280ad1cbbd016ea6cef27bee887074f785243166

    • SSDEEP

      24576:Py/d2Uxd6+hYwp4jNlDJj7Rb4w2YWsXGJAaU:a12UP6+hu3DHAYxk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks