General

  • Target

    1454972d34fc307860af1a1cc42082bf8715c3cc5b881045b06565efbd87f7b4

  • Size

    786KB

  • Sample

    231012-jm5rdsgh94

  • MD5

    adaa77ab5345876ec6edaee2d86b51e8

  • SHA1

    65eec4bcdd12b106fd36e43b4cad12a328cad9af

  • SHA256

    1454972d34fc307860af1a1cc42082bf8715c3cc5b881045b06565efbd87f7b4

  • SHA512

    f0ae6dce7c867455f25555c93dc08ca6c31dcd7a560e2e003d17aac4c27a265cd3f361c00e7245ca79b92f154f470bb8a5fc26c7ec66107d2ce616b9b8d3e965

  • SSDEEP

    12288:ZMrLy90vRMGnc0miXx5kJ8tKNuWG6yyFQG99kcRTAcvEeos7QROwHD4q:WyHgOiXxGaVlgMKAcvEAQROSDZ

Malware Config

Extracted

Family

redline

Botnet

buben

C2

77.91.124.82:19071

Attributes
  • auth_value

    c62fa04aa45f5b78f62d2c21fcbefdec

Targets

    • Target

      1454972d34fc307860af1a1cc42082bf8715c3cc5b881045b06565efbd87f7b4

    • Size

      786KB

    • MD5

      adaa77ab5345876ec6edaee2d86b51e8

    • SHA1

      65eec4bcdd12b106fd36e43b4cad12a328cad9af

    • SHA256

      1454972d34fc307860af1a1cc42082bf8715c3cc5b881045b06565efbd87f7b4

    • SHA512

      f0ae6dce7c867455f25555c93dc08ca6c31dcd7a560e2e003d17aac4c27a265cd3f361c00e7245ca79b92f154f470bb8a5fc26c7ec66107d2ce616b9b8d3e965

    • SSDEEP

      12288:ZMrLy90vRMGnc0miXx5kJ8tKNuWG6yyFQG99kcRTAcvEeos7QROwHD4q:WyHgOiXxGaVlgMKAcvEAQROSDZ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks