General

  • Target

    1de66e5146a6b47cf63e9280641fa407e9edf5814329d1629ea4252237f58fa9

  • Size

    1.1MB

  • Sample

    241105-wt9p5swbmf

  • MD5

    a4d4c4c9cd644e45c4a89f339131fb3b

  • SHA1

    c5fd0341fcfcc354309fb27013601f4abb283681

  • SHA256

    1de66e5146a6b47cf63e9280641fa407e9edf5814329d1629ea4252237f58fa9

  • SHA512

    b6853996149c79a88c5d3bf0aeb099ef26c91d2f9801fbff9f0a2de52c252d31495c3a3bddc43ed22d524468030ee9e1586228a1503c3a5dc14f053bc3425baf

  • SSDEEP

    24576:Tyy57e3wHr+oE2Ed0RoY82SqEeGtOp6KwwdL/7GM3q0vQM6:m+7eAHrV80YoNSOp/dL/OM

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      1de66e5146a6b47cf63e9280641fa407e9edf5814329d1629ea4252237f58fa9

    • Size

      1.1MB

    • MD5

      a4d4c4c9cd644e45c4a89f339131fb3b

    • SHA1

      c5fd0341fcfcc354309fb27013601f4abb283681

    • SHA256

      1de66e5146a6b47cf63e9280641fa407e9edf5814329d1629ea4252237f58fa9

    • SHA512

      b6853996149c79a88c5d3bf0aeb099ef26c91d2f9801fbff9f0a2de52c252d31495c3a3bddc43ed22d524468030ee9e1586228a1503c3a5dc14f053bc3425baf

    • SSDEEP

      24576:Tyy57e3wHr+oE2Ed0RoY82SqEeGtOp6KwwdL/7GM3q0vQM6:m+7eAHrV80YoNSOp/dL/OM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks