General

  • Target

    04476bdb297dcbf6d76f193ae8f1de0fc9c48f09bf76e50bdc8ab29e5ba5a381

  • Size

    932KB

  • Sample

    241105-tq1a7atgrd

  • MD5

    a0e9871bb2f220f03fdc3987b07b049a

  • SHA1

    6daa5b66dae4df57f5e2eff280351b3caeb088c5

  • SHA256

    04476bdb297dcbf6d76f193ae8f1de0fc9c48f09bf76e50bdc8ab29e5ba5a381

  • SHA512

    8d2fad63288e34e16a63b5b4ea775048ef13c07407a53572c631a61cb675d16935bc4efb022e2636a2e51b5f6c4c9242ae4c88891d5b9f1de601e36401806883

  • SSDEEP

    12288:MMrby90fOIDa0Q8DZZ8xQgB4hXsxzPOO2MnREYCdYRsEhTgm/qORJbkoyMOYRjF:/yR07dZ8+i4qxyOfGdY6Eh5xktMxF

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      04476bdb297dcbf6d76f193ae8f1de0fc9c48f09bf76e50bdc8ab29e5ba5a381

    • Size

      932KB

    • MD5

      a0e9871bb2f220f03fdc3987b07b049a

    • SHA1

      6daa5b66dae4df57f5e2eff280351b3caeb088c5

    • SHA256

      04476bdb297dcbf6d76f193ae8f1de0fc9c48f09bf76e50bdc8ab29e5ba5a381

    • SHA512

      8d2fad63288e34e16a63b5b4ea775048ef13c07407a53572c631a61cb675d16935bc4efb022e2636a2e51b5f6c4c9242ae4c88891d5b9f1de601e36401806883

    • SSDEEP

      12288:MMrby90fOIDa0Q8DZZ8xQgB4hXsxzPOO2MnREYCdYRsEhTgm/qORJbkoyMOYRjF:/yR07dZ8+i4qxyOfGdY6Eh5xktMxF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks