General

  • Target

    a445d2b60edd47ab40718cf0a0496befeb76a5b6ec7976f3db55a11f1ee30f5b

  • Size

    1.1MB

  • Sample

    241108-g7z1jaxelg

  • MD5

    6301577aebeeee3f56b11fb2c06ec69e

  • SHA1

    fdece6be97629630e33286dcea552ae00da8003d

  • SHA256

    a445d2b60edd47ab40718cf0a0496befeb76a5b6ec7976f3db55a11f1ee30f5b

  • SHA512

    12fff71e9530ad40393939d5fa27e1bc21a996b3c84b4d5016eb87e93b21065b58b87c8467aff8e4ad5894ce55403dc59f74b58c05d049efb5860d1501f47067

  • SSDEEP

    24576:7y9DXXFAP41Kghp73W5Rc8idgocS3k/AAvGtPZEw/bpJlwNb:uxXH1KspjW5RcjuzS3AAAvIOcpJl

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      a445d2b60edd47ab40718cf0a0496befeb76a5b6ec7976f3db55a11f1ee30f5b

    • Size

      1.1MB

    • MD5

      6301577aebeeee3f56b11fb2c06ec69e

    • SHA1

      fdece6be97629630e33286dcea552ae00da8003d

    • SHA256

      a445d2b60edd47ab40718cf0a0496befeb76a5b6ec7976f3db55a11f1ee30f5b

    • SHA512

      12fff71e9530ad40393939d5fa27e1bc21a996b3c84b4d5016eb87e93b21065b58b87c8467aff8e4ad5894ce55403dc59f74b58c05d049efb5860d1501f47067

    • SSDEEP

      24576:7y9DXXFAP41Kghp73W5Rc8idgocS3k/AAvGtPZEw/bpJlwNb:uxXH1KspjW5RcjuzS3AAAvIOcpJl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks