General

  • Target

    a1144926e24c781c777900562b9e5c4a63152e9fdb599de379ad953a5b8396fa

  • Size

    1.1MB

  • Sample

    241104-senbta1gqa

  • MD5

    de0c80bded816740a0df7c20dce4b10a

  • SHA1

    9842e042025531f42ff5e62bdf30dcb398f79341

  • SHA256

    a1144926e24c781c777900562b9e5c4a63152e9fdb599de379ad953a5b8396fa

  • SHA512

    272a654b220349b919bf971d135e8854e83f06978215f3a56b76a44e67eda177719ff038310b91b0a7ab86c0a8d242e83569e20a04d1859b287f418ef5d6c211

  • SSDEEP

    24576:OyrVN0rt0f9iqLu4Y6f43ZsOj33Ei8pZm9NiCcbOFLz:drW0Mq6P3ZsoEirNXJ

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      a1144926e24c781c777900562b9e5c4a63152e9fdb599de379ad953a5b8396fa

    • Size

      1.1MB

    • MD5

      de0c80bded816740a0df7c20dce4b10a

    • SHA1

      9842e042025531f42ff5e62bdf30dcb398f79341

    • SHA256

      a1144926e24c781c777900562b9e5c4a63152e9fdb599de379ad953a5b8396fa

    • SHA512

      272a654b220349b919bf971d135e8854e83f06978215f3a56b76a44e67eda177719ff038310b91b0a7ab86c0a8d242e83569e20a04d1859b287f418ef5d6c211

    • SSDEEP

      24576:OyrVN0rt0f9iqLu4Y6f43ZsOj33Ei8pZm9NiCcbOFLz:drW0Mq6P3ZsoEirNXJ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks