General

  • Target

    447d293a9730e42aa500b4653231c24a56b62a7df04acf775eb048681400b7b6

  • Size

    1.1MB

  • Sample

    241104-vbn52stbla

  • MD5

    fa8ccf2a537b2963896495205089bf76

  • SHA1

    be769cc841dbd8987c05748af8330b5cfe718259

  • SHA256

    447d293a9730e42aa500b4653231c24a56b62a7df04acf775eb048681400b7b6

  • SHA512

    d7e20effb6466f2b483d0065f2904c358b3b0f40e10669b0983dd6552bdb7f93893446ac7f9d2fe89fb37811d3226f77905fdd80c910f68df4ae3518a146fd6f

  • SSDEEP

    24576:GybUDQRrOwk2IdDYAKkkONZmIbTQGcrHXAiMH3ZA0Z:VbUDQRvk2I5KkkKZmmHcs

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      447d293a9730e42aa500b4653231c24a56b62a7df04acf775eb048681400b7b6

    • Size

      1.1MB

    • MD5

      fa8ccf2a537b2963896495205089bf76

    • SHA1

      be769cc841dbd8987c05748af8330b5cfe718259

    • SHA256

      447d293a9730e42aa500b4653231c24a56b62a7df04acf775eb048681400b7b6

    • SHA512

      d7e20effb6466f2b483d0065f2904c358b3b0f40e10669b0983dd6552bdb7f93893446ac7f9d2fe89fb37811d3226f77905fdd80c910f68df4ae3518a146fd6f

    • SSDEEP

      24576:GybUDQRrOwk2IdDYAKkkONZmIbTQGcrHXAiMH3ZA0Z:VbUDQRvk2I5KkkKZmmHcs

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks