General

  • Target

    3e2b758d672a00ebe6779a0022edc6d90e5deba8f17e75dffb8229b730c0b4d0

  • Size

    1.1MB

  • Sample

    241108-desh7stflq

  • MD5

    14ce8a77326e6cc70b0ab8a8f0224c37

  • SHA1

    2009104fb47889a381e36338c0b490297bee5e47

  • SHA256

    3e2b758d672a00ebe6779a0022edc6d90e5deba8f17e75dffb8229b730c0b4d0

  • SHA512

    8b668c06aac09fef727275ffd719476aebc87f42c7124c62067e1161f910b6873a109987e546633cd43aaabeeaaedac9fb45e918f0d22e337a518af11595edc2

  • SSDEEP

    24576:Gyrj5LntbCLl50cgCHxlpJLKMJ27865r1noHB4NI80Or3+Wk1DKWD:VX5tCLf0cgOwnBoh4NXL+F3

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      3e2b758d672a00ebe6779a0022edc6d90e5deba8f17e75dffb8229b730c0b4d0

    • Size

      1.1MB

    • MD5

      14ce8a77326e6cc70b0ab8a8f0224c37

    • SHA1

      2009104fb47889a381e36338c0b490297bee5e47

    • SHA256

      3e2b758d672a00ebe6779a0022edc6d90e5deba8f17e75dffb8229b730c0b4d0

    • SHA512

      8b668c06aac09fef727275ffd719476aebc87f42c7124c62067e1161f910b6873a109987e546633cd43aaabeeaaedac9fb45e918f0d22e337a518af11595edc2

    • SSDEEP

      24576:Gyrj5LntbCLl50cgCHxlpJLKMJ27865r1noHB4NI80Or3+Wk1DKWD:VX5tCLf0cgOwnBoh4NXL+F3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks