General

  • Target

    321d2072d365e92263816984e3e7bc9db7814e33380a3f38ca4e40367ccfe9e9

  • Size

    1.2MB

  • Sample

    231013-n7bq9sbb54

  • MD5

    0eee36bdc0bd0e6bd2a1122ebf6d5ca1

  • SHA1

    dba0f37871f86a3ff372f18547fd62090aef880c

  • SHA256

    5d6e7e52a859da2a612640f698b2f21b167af81269be9c702a5c25c4734f8682

  • SHA512

    ef519279d722b9e215e71417cf9570c90fa73eb6ef877d942ec2debef3eabae37b319bf39f675877f5c5cd193123f3cb9b314e531042cb8e16569b91dcf9c5da

  • SSDEEP

    24576:TMqyAPEHTudcX4+pqqs7gw/vuq4FERbkscWWKl1huE5Yft1cSphEm:2AUTe6pq7gI4kosBWWEkciSpr

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Targets

    • Target

      321d2072d365e92263816984e3e7bc9db7814e33380a3f38ca4e40367ccfe9e9

    • Size

      1.2MB

    • MD5

      acbf8683393b9f3e772313dd600e0986

    • SHA1

      549e107875291828c5462e38a5aebb8a66c8d2cc

    • SHA256

      321d2072d365e92263816984e3e7bc9db7814e33380a3f38ca4e40367ccfe9e9

    • SHA512

      1af8881858e860ce7ab77de83fe54f54faf8ae58aef22f47929f9670671a171ffe1a0ee539a338352320f2110b124625728f7cfae2cc32be300322d398e33407

    • SSDEEP

      24576:AyzZd7YdcdW+tqqs7Yw/HEq4rEZbkupcCW+h1hqAduntjcSpgTfS1:HP7UStq7Yq4Aoy7Wu0D4Spgm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks