General

  • Target

    52ca03fe3b4240fe7ffb0ac83d464e0d1a2edb6340138e83e821f5789c942c82

  • Size

    1.1MB

  • Sample

    241105-3qlbpstpcl

  • MD5

    a67a9303a5415e552616ea315d74a081

  • SHA1

    8385d5c5e9c0e2ccfc2c6df7ceea66c9e2b8de23

  • SHA256

    52ca03fe3b4240fe7ffb0ac83d464e0d1a2edb6340138e83e821f5789c942c82

  • SHA512

    ae22bdf916ade46043f852eceb2a0bc28724f920dd42cc455acc0c36fdb67c7572d2b11280d4beebb3974e411d5116a5215017db384828bcb0e078efd9c06e00

  • SSDEEP

    24576:Sy80UnD7X07DJ+uh4lAS7lFq9TM2RkBPajli+J7Q:55dXUumASbQtRCajliy

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      52ca03fe3b4240fe7ffb0ac83d464e0d1a2edb6340138e83e821f5789c942c82

    • Size

      1.1MB

    • MD5

      a67a9303a5415e552616ea315d74a081

    • SHA1

      8385d5c5e9c0e2ccfc2c6df7ceea66c9e2b8de23

    • SHA256

      52ca03fe3b4240fe7ffb0ac83d464e0d1a2edb6340138e83e821f5789c942c82

    • SHA512

      ae22bdf916ade46043f852eceb2a0bc28724f920dd42cc455acc0c36fdb67c7572d2b11280d4beebb3974e411d5116a5215017db384828bcb0e078efd9c06e00

    • SSDEEP

      24576:Sy80UnD7X07DJ+uh4lAS7lFq9TM2RkBPajli+J7Q:55dXUumASbQtRCajliy

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks