General

  • Target

    d7cd3a1ef794aa51954faaf1ac2f0767a55f441f380465112df6afa752614afc

  • Size

    480KB

  • Sample

    241108-2va6vstrgj

  • MD5

    87ebd05ab773be8a46b54851c31de4f2

  • SHA1

    69bff3112a0305a7284bab386f33b13ed030ec26

  • SHA256

    d7cd3a1ef794aa51954faaf1ac2f0767a55f441f380465112df6afa752614afc

  • SHA512

    95fcb24fb186f0d074d4c80fe7e50390753ff3c1f20c7ee81ff9290bf702047a092cf26ccc0e70e179997bef4cf487a0b21a5cae89ed7ab8a67e442580c64e13

  • SSDEEP

    6144:K1y+bnr+sp0yN90QEC5rHyzbgwzKtMoqPhG2MnxJkSxQ1zwwN3aQy0zpPBwWTrj0:XMrgy90Y5WzjD4hTMJap0zgWzKEc

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      d7cd3a1ef794aa51954faaf1ac2f0767a55f441f380465112df6afa752614afc

    • Size

      480KB

    • MD5

      87ebd05ab773be8a46b54851c31de4f2

    • SHA1

      69bff3112a0305a7284bab386f33b13ed030ec26

    • SHA256

      d7cd3a1ef794aa51954faaf1ac2f0767a55f441f380465112df6afa752614afc

    • SHA512

      95fcb24fb186f0d074d4c80fe7e50390753ff3c1f20c7ee81ff9290bf702047a092cf26ccc0e70e179997bef4cf487a0b21a5cae89ed7ab8a67e442580c64e13

    • SSDEEP

      6144:K1y+bnr+sp0yN90QEC5rHyzbgwzKtMoqPhG2MnxJkSxQ1zwwN3aQy0zpPBwWTrj0:XMrgy90Y5WzjD4hTMJap0zgWzKEc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks