General

  • Target

    a810678a00afee29d188c8318d536f382ddac8787de565d5797a212c94b73636

  • Size

    1.1MB

  • Sample

    241105-kxxzzaygmj

  • MD5

    2cf5e65f9e8428028061f39a43d4a9c4

  • SHA1

    b3371ac1217f62fb7eb503e6740e0aae27a2cc77

  • SHA256

    a810678a00afee29d188c8318d536f382ddac8787de565d5797a212c94b73636

  • SHA512

    27a1997f8320649e8d0ee2169cd3474b3700f33174f983df5056e8673f1cd9da52749507ed8ceea6d75ee0aa660c9023bdcaf88659e3bad64bbc0f74c01f3fc2

  • SSDEEP

    24576:2ynZ1xb0LgEIwc8Od+udYpTSQ5eu6LdC/e+/7lC+YGliW9qpg6:FZrb0JM8OpupTLGR3elC+YG0WWg

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      a810678a00afee29d188c8318d536f382ddac8787de565d5797a212c94b73636

    • Size

      1.1MB

    • MD5

      2cf5e65f9e8428028061f39a43d4a9c4

    • SHA1

      b3371ac1217f62fb7eb503e6740e0aae27a2cc77

    • SHA256

      a810678a00afee29d188c8318d536f382ddac8787de565d5797a212c94b73636

    • SHA512

      27a1997f8320649e8d0ee2169cd3474b3700f33174f983df5056e8673f1cd9da52749507ed8ceea6d75ee0aa660c9023bdcaf88659e3bad64bbc0f74c01f3fc2

    • SSDEEP

      24576:2ynZ1xb0LgEIwc8Od+udYpTSQ5eu6LdC/e+/7lC+YGliW9qpg6:FZrb0JM8OpupTLGR3elC+YG0WWg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks