General

  • Target

    3105d92d0ba5babb7a796cd93d36c1a4548cd2a26f61463c8249d6b2b635b2d3

  • Size

    1.1MB

  • Sample

    241107-fpnn4sylaj

  • MD5

    adf943398ade6a9af527aacee3e9ee38

  • SHA1

    449652aa2c9869508160e3b531013d7a1cace079

  • SHA256

    3105d92d0ba5babb7a796cd93d36c1a4548cd2a26f61463c8249d6b2b635b2d3

  • SHA512

    7ea12078cb7819f347d4b85eec32db2ca0c90fed06336c7fa5c70e1df47a65d86466c49b70249f850246ef34f8ed94de140748bdb7ff910f5d5a48e41a3da5e5

  • SSDEEP

    24576:9ylpiD0RKIWD1YZ94aNM2DYYnb9CLEGkFmB:YlpiDazWDY9Hb9CLEGk

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      3105d92d0ba5babb7a796cd93d36c1a4548cd2a26f61463c8249d6b2b635b2d3

    • Size

      1.1MB

    • MD5

      adf943398ade6a9af527aacee3e9ee38

    • SHA1

      449652aa2c9869508160e3b531013d7a1cace079

    • SHA256

      3105d92d0ba5babb7a796cd93d36c1a4548cd2a26f61463c8249d6b2b635b2d3

    • SHA512

      7ea12078cb7819f347d4b85eec32db2ca0c90fed06336c7fa5c70e1df47a65d86466c49b70249f850246ef34f8ed94de140748bdb7ff910f5d5a48e41a3da5e5

    • SSDEEP

      24576:9ylpiD0RKIWD1YZ94aNM2DYYnb9CLEGkFmB:YlpiDazWDY9Hb9CLEGk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks