General

  • Target

    7e304e75970e9765fc26b74b21981ef02dc07690815e712c3a9289f7e35c311e

  • Size

    1.1MB

  • Sample

    241108-ajb58s1cra

  • MD5

    77e05b07f8e1e2b52ac576885fe7ea93

  • SHA1

    6949b0a758e32cd52cbc2a81c157855a5dee6960

  • SHA256

    7e304e75970e9765fc26b74b21981ef02dc07690815e712c3a9289f7e35c311e

  • SHA512

    9b86e0a178b4e7dcf0e585c745f94dae35142c230b2305d8210f42e0343ce9dc083774c37e2152d5db62036fcae7f7d71f551ad88b2b8ac2fb4482de24ef56f4

  • SSDEEP

    24576:Ly3aC6bUXWQiXKtDJzlfBmb0s4m3gAi/FTdqtD0e9BGXVelLAuzl:+3qbUoXEQbsm3g5oljkCM

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      7e304e75970e9765fc26b74b21981ef02dc07690815e712c3a9289f7e35c311e

    • Size

      1.1MB

    • MD5

      77e05b07f8e1e2b52ac576885fe7ea93

    • SHA1

      6949b0a758e32cd52cbc2a81c157855a5dee6960

    • SHA256

      7e304e75970e9765fc26b74b21981ef02dc07690815e712c3a9289f7e35c311e

    • SHA512

      9b86e0a178b4e7dcf0e585c745f94dae35142c230b2305d8210f42e0343ce9dc083774c37e2152d5db62036fcae7f7d71f551ad88b2b8ac2fb4482de24ef56f4

    • SSDEEP

      24576:Ly3aC6bUXWQiXKtDJzlfBmb0s4m3gAi/FTdqtD0e9BGXVelLAuzl:+3qbUoXEQbsm3g5oljkCM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks