General

  • Target

    4e85c62eda289425b43359e2219be3deb32d964e8f716e78a5d18b7ff8ddc9bd

  • Size

    591KB

  • Sample

    241105-2l9m3azjcv

  • MD5

    c3bb06bd278f07204e337f939545dd90

  • SHA1

    c1857a13077f51631388b11526309e97329554b3

  • SHA256

    4e85c62eda289425b43359e2219be3deb32d964e8f716e78a5d18b7ff8ddc9bd

  • SHA512

    0277ab9977febc032e16d9aea910838066cefe9828b7613485b046de4ca4067ee4dbb5f7b2fa8440f3c3096c1e7b2bdde74d908a8341030bf09fbf521b4e0cf7

  • SSDEEP

    12288:eMrGy90WbixKMXbtj218QpRbiT7C9iMV0eoaal1m+/4SPpxGnkt:4yHixKMJi8QHbLZ0eo3m+Vx/t

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      4e85c62eda289425b43359e2219be3deb32d964e8f716e78a5d18b7ff8ddc9bd

    • Size

      591KB

    • MD5

      c3bb06bd278f07204e337f939545dd90

    • SHA1

      c1857a13077f51631388b11526309e97329554b3

    • SHA256

      4e85c62eda289425b43359e2219be3deb32d964e8f716e78a5d18b7ff8ddc9bd

    • SHA512

      0277ab9977febc032e16d9aea910838066cefe9828b7613485b046de4ca4067ee4dbb5f7b2fa8440f3c3096c1e7b2bdde74d908a8341030bf09fbf521b4e0cf7

    • SSDEEP

      12288:eMrGy90WbixKMXbtj218QpRbiT7C9iMV0eoaal1m+/4SPpxGnkt:4yHixKMJi8QHbLZ0eo3m+Vx/t

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks