General

  • Target

    8b528e041b82af44915a5e1543a80475e5cfc2d654d8fc9361f658cb9c7433f6

  • Size

    1.1MB

  • Sample

    241107-qjse8askh1

  • MD5

    90bb5937bc431586bf3e4ff619634f7c

  • SHA1

    856259e0f67d4872767b8c3a3eef8e6561218b03

  • SHA256

    8b528e041b82af44915a5e1543a80475e5cfc2d654d8fc9361f658cb9c7433f6

  • SHA512

    470127eddcf06c76128c28f9943f521ca855357da849749dc7c04cee9355fb45748ed87df134620760d90e0b6048ac066ee8fe127f71c268e5c8bcd266a53d24

  • SSDEEP

    24576:Cy5JsHQJ/uMpRXiRyscmQ2gCeo0gpGQmdLtB/+7Np1mAFt:pIwJ/uMp9ic7CeIpXOtB/2Q

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      8b528e041b82af44915a5e1543a80475e5cfc2d654d8fc9361f658cb9c7433f6

    • Size

      1.1MB

    • MD5

      90bb5937bc431586bf3e4ff619634f7c

    • SHA1

      856259e0f67d4872767b8c3a3eef8e6561218b03

    • SHA256

      8b528e041b82af44915a5e1543a80475e5cfc2d654d8fc9361f658cb9c7433f6

    • SHA512

      470127eddcf06c76128c28f9943f521ca855357da849749dc7c04cee9355fb45748ed87df134620760d90e0b6048ac066ee8fe127f71c268e5c8bcd266a53d24

    • SSDEEP

      24576:Cy5JsHQJ/uMpRXiRyscmQ2gCeo0gpGQmdLtB/+7Np1mAFt:pIwJ/uMp9ic7CeIpXOtB/2Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks