General

  • Target

    05824f82e70a1564cfc105478c64f1c40fcb939f4f2d65bf2aef4b3a8fcb03f3

  • Size

    754KB

  • Sample

    241105-ryx5pasgjd

  • MD5

    feb73eaeeb487dadcf64f10c9cc21b68

  • SHA1

    a9fd73c8b79377ba6caf6c0b0224e954e6e54a66

  • SHA256

    05824f82e70a1564cfc105478c64f1c40fcb939f4f2d65bf2aef4b3a8fcb03f3

  • SHA512

    d11345f97c26a0f3c899ddff2505cd0d09f7e06ddda415cb5e330ae54fabfce8cebc998851d2538d7bcc11d0c71dd888a07c047ef922f5adbb9b0365052882cf

  • SSDEEP

    12288:dMrty90ZkDtl4goFGCDL3NyOY6PVkJcFzJQGtut:UyLlwVDLNHbPPhJkt

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      05824f82e70a1564cfc105478c64f1c40fcb939f4f2d65bf2aef4b3a8fcb03f3

    • Size

      754KB

    • MD5

      feb73eaeeb487dadcf64f10c9cc21b68

    • SHA1

      a9fd73c8b79377ba6caf6c0b0224e954e6e54a66

    • SHA256

      05824f82e70a1564cfc105478c64f1c40fcb939f4f2d65bf2aef4b3a8fcb03f3

    • SHA512

      d11345f97c26a0f3c899ddff2505cd0d09f7e06ddda415cb5e330ae54fabfce8cebc998851d2538d7bcc11d0c71dd888a07c047ef922f5adbb9b0365052882cf

    • SSDEEP

      12288:dMrty90ZkDtl4goFGCDL3NyOY6PVkJcFzJQGtut:UyLlwVDLNHbPPhJkt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks