General

  • Target

    3f74013e47a2d6b409a9fe48cb0568b7d85b40fba4c8549904a3fb392b0e707f

  • Size

    1.1MB

  • Sample

    241107-sdvz9stmgs

  • MD5

    6a0d85c36bb45691859ddbe22defe4bf

  • SHA1

    e35e9132b8b8c5827df796f0fafabdf9462d8318

  • SHA256

    3f74013e47a2d6b409a9fe48cb0568b7d85b40fba4c8549904a3fb392b0e707f

  • SHA512

    222c80523d8a6a99b946bf6e43bccca5e504749201a81c01d8348f52d44644077c4ab6143c2be7a0f43048bb9792ce1d410faab8e0be9529dad152e467258e0d

  • SSDEEP

    24576:XyfJLKyex0OsfeDIczhdd6vz2v6cGTKvyhiQGxN68PN3:idKyypsG8cVm+lGuyzGxNh

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      3f74013e47a2d6b409a9fe48cb0568b7d85b40fba4c8549904a3fb392b0e707f

    • Size

      1.1MB

    • MD5

      6a0d85c36bb45691859ddbe22defe4bf

    • SHA1

      e35e9132b8b8c5827df796f0fafabdf9462d8318

    • SHA256

      3f74013e47a2d6b409a9fe48cb0568b7d85b40fba4c8549904a3fb392b0e707f

    • SHA512

      222c80523d8a6a99b946bf6e43bccca5e504749201a81c01d8348f52d44644077c4ab6143c2be7a0f43048bb9792ce1d410faab8e0be9529dad152e467258e0d

    • SSDEEP

      24576:XyfJLKyex0OsfeDIczhdd6vz2v6cGTKvyhiQGxN68PN3:idKyypsG8cVm+lGuyzGxNh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks