General

  • Target

    f21e7b910ff44dd4217e8a8017ed8a49331cb3c99b88cc9c0a92eca1f233aaa0

  • Size

    1.1MB

  • Sample

    241106-rtbqws1hqa

  • MD5

    c18c67642b8a057de90cd72193d28879

  • SHA1

    c433548aed48df5f689f2c9b302a88a4207d3007

  • SHA256

    f21e7b910ff44dd4217e8a8017ed8a49331cb3c99b88cc9c0a92eca1f233aaa0

  • SHA512

    6173f501cbd65ba048679a3d25a523c643a4c53eed422cf8a65bb19bb4fa68ddfe0a465295c18af8c1289c1a6936b7170089d444e33c1dfdbc7d4f47a81f424d

  • SSDEEP

    24576:XyvhQ2AabmgrDq0OfwfoeSl/LVDehc518rd7C0m:i5Q2AaR3DOmoRTVDw+cd

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      f21e7b910ff44dd4217e8a8017ed8a49331cb3c99b88cc9c0a92eca1f233aaa0

    • Size

      1.1MB

    • MD5

      c18c67642b8a057de90cd72193d28879

    • SHA1

      c433548aed48df5f689f2c9b302a88a4207d3007

    • SHA256

      f21e7b910ff44dd4217e8a8017ed8a49331cb3c99b88cc9c0a92eca1f233aaa0

    • SHA512

      6173f501cbd65ba048679a3d25a523c643a4c53eed422cf8a65bb19bb4fa68ddfe0a465295c18af8c1289c1a6936b7170089d444e33c1dfdbc7d4f47a81f424d

    • SSDEEP

      24576:XyvhQ2AabmgrDq0OfwfoeSl/LVDehc518rd7C0m:i5Q2AaR3DOmoRTVDw+cd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks