General

  • Target

    77bb9b823dfb2a23354a3e55addd80317a64d36227dabb74977a21bf179ca786

  • Size

    479KB

  • Sample

    241105-fjeh9awblj

  • MD5

    cc8ed4d541195a32a1d2f3507e4ac795

  • SHA1

    16b8ae57dcb097dcc93ca4b894fc2cba023726c6

  • SHA256

    77bb9b823dfb2a23354a3e55addd80317a64d36227dabb74977a21bf179ca786

  • SHA512

    36fa734a68342d67234e2683594a886eb8d37aae606c7b6ab9a52c45873de56d16e8fdb946c545477c04d5e814d3c7bb84dfbe652b1b169c0d19dac573fcbd7a

  • SSDEEP

    6144:KYy+bnr+Lp0yN90QEVU+ufP2XO7B4bDpNjzIqkaIvXNSaVvivWdn+tczyqapNtpY:EMrHy903UHPT7B4bXjzrW9SsDgH7zDW

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      77bb9b823dfb2a23354a3e55addd80317a64d36227dabb74977a21bf179ca786

    • Size

      479KB

    • MD5

      cc8ed4d541195a32a1d2f3507e4ac795

    • SHA1

      16b8ae57dcb097dcc93ca4b894fc2cba023726c6

    • SHA256

      77bb9b823dfb2a23354a3e55addd80317a64d36227dabb74977a21bf179ca786

    • SHA512

      36fa734a68342d67234e2683594a886eb8d37aae606c7b6ab9a52c45873de56d16e8fdb946c545477c04d5e814d3c7bb84dfbe652b1b169c0d19dac573fcbd7a

    • SSDEEP

      6144:KYy+bnr+Lp0yN90QEVU+ufP2XO7B4bDpNjzIqkaIvXNSaVvivWdn+tczyqapNtpY:EMrHy903UHPT7B4bXjzrW9SsDgH7zDW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks