General

  • Target

    d957d767d476ea1949fd5bb472da844cc61d25878078d19aa0f7a74d76866b39

  • Size

    785KB

  • Sample

    231012-jsc9bsfd7v

  • MD5

    866c9491942afb2557e237bc386f01c4

  • SHA1

    f7499011a70863a48d84af8843bfb40eff97939e

  • SHA256

    d957d767d476ea1949fd5bb472da844cc61d25878078d19aa0f7a74d76866b39

  • SHA512

    d07d47b666259a7737aa13dcd705995310c63a184f59c332db54006ca0b9161ba6c2b5aa9e9c46eb1ec17993e7da6a23dd0bc8cd409cbe71f86606a844c9ec49

  • SSDEEP

    12288:qMrUy9084wq2VXl6kta/hV6jUCd4v8SDhqxsxu9OXlyukNF+6X8spX65f:SyP4j29yV6jUG4vt9qUsokNFXVl65f

Malware Config

Extracted

Family

redline

Botnet

buben

C2

77.91.124.82:19071

Attributes
  • auth_value

    c62fa04aa45f5b78f62d2c21fcbefdec

Targets

    • Target

      d957d767d476ea1949fd5bb472da844cc61d25878078d19aa0f7a74d76866b39

    • Size

      785KB

    • MD5

      866c9491942afb2557e237bc386f01c4

    • SHA1

      f7499011a70863a48d84af8843bfb40eff97939e

    • SHA256

      d957d767d476ea1949fd5bb472da844cc61d25878078d19aa0f7a74d76866b39

    • SHA512

      d07d47b666259a7737aa13dcd705995310c63a184f59c332db54006ca0b9161ba6c2b5aa9e9c46eb1ec17993e7da6a23dd0bc8cd409cbe71f86606a844c9ec49

    • SSDEEP

      12288:qMrUy9084wq2VXl6kta/hV6jUCd4v8SDhqxsxu9OXlyukNF+6X8spX65f:SyP4j29yV6jUG4vt9qUsokNFXVl65f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks