General

  • Target

    d807b9db9733e019b2a0f62253835a111a317d8d0aab3a7eccfdb54bf51b5a6e

  • Size

    1.1MB

  • Sample

    241104-zxldhazmen

  • MD5

    8a2ca8644d7b8e1660ae4344f6984332

  • SHA1

    43ca7ff0c0b517a97d25e0fec8af6f0d25f9fa6c

  • SHA256

    d807b9db9733e019b2a0f62253835a111a317d8d0aab3a7eccfdb54bf51b5a6e

  • SHA512

    09c7a40e02ef84d882abfdd8eefc347f240ae048b4b1db8c481f1a3ae171b29ba186e4fbd1ba4233b3e926923922522dae2775e18a21a7d18828d0c740b23688

  • SSDEEP

    24576:by1IGacmdOv0p/y3rP+6pP7NhEU7sGx0kqLE:OWGacmUv05cP5hUi0tL

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      d807b9db9733e019b2a0f62253835a111a317d8d0aab3a7eccfdb54bf51b5a6e

    • Size

      1.1MB

    • MD5

      8a2ca8644d7b8e1660ae4344f6984332

    • SHA1

      43ca7ff0c0b517a97d25e0fec8af6f0d25f9fa6c

    • SHA256

      d807b9db9733e019b2a0f62253835a111a317d8d0aab3a7eccfdb54bf51b5a6e

    • SHA512

      09c7a40e02ef84d882abfdd8eefc347f240ae048b4b1db8c481f1a3ae171b29ba186e4fbd1ba4233b3e926923922522dae2775e18a21a7d18828d0c740b23688

    • SSDEEP

      24576:by1IGacmdOv0p/y3rP+6pP7NhEU7sGx0kqLE:OWGacmUv05cP5hUi0tL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks