General

  • Target

    2a5d495259be0c3b88c3755534471216688ec52eabcce3c9e269784abc73c596

  • Size

    382KB

  • Sample

    241108-k46wfszenj

  • MD5

    6413b74397a16efd1f929289348ce664

  • SHA1

    c3488c02b89f290f230c0237cd48784f141783fe

  • SHA256

    2a5d495259be0c3b88c3755534471216688ec52eabcce3c9e269784abc73c596

  • SHA512

    861955a43510ff0f949f20ec6ba4cd154093e135bd85089f15aa0b0932c318d769dc0d3b7aba9300ce38bd62ff2830b4a18db768c76fbe4ff991e8c1c46fcc74

  • SSDEEP

    6144:Kwy+bnr+dp0yN90QE5WbE7997inHvTN8+Rkkpqpzgp3IBrAXLhjjWsx:8Mrty90+Ex9eHpdRlOz5rMLhjasx

Malware Config

Extracted

Family

redline

Botnet

diza

C2

217.196.96.56:4138

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Targets

    • Target

      2a5d495259be0c3b88c3755534471216688ec52eabcce3c9e269784abc73c596

    • Size

      382KB

    • MD5

      6413b74397a16efd1f929289348ce664

    • SHA1

      c3488c02b89f290f230c0237cd48784f141783fe

    • SHA256

      2a5d495259be0c3b88c3755534471216688ec52eabcce3c9e269784abc73c596

    • SHA512

      861955a43510ff0f949f20ec6ba4cd154093e135bd85089f15aa0b0932c318d769dc0d3b7aba9300ce38bd62ff2830b4a18db768c76fbe4ff991e8c1c46fcc74

    • SSDEEP

      6144:Kwy+bnr+dp0yN90QE5WbE7997inHvTN8+Rkkpqpzgp3IBrAXLhjjWsx:8Mrty90+Ex9eHpdRlOz5rMLhjasx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks