General

  • Target

    1dbcf9f48347579ef514c4c70c8e4bdc03ef98a9be2e38fddb12b093dbaf1149

  • Size

    1.1MB

  • Sample

    241108-mendxs1clj

  • MD5

    717cb965297e8422867936184fdda328

  • SHA1

    30f46a92c83c1308bddd17acf7b667d74219a823

  • SHA256

    1dbcf9f48347579ef514c4c70c8e4bdc03ef98a9be2e38fddb12b093dbaf1149

  • SHA512

    2f97643ef608211e5031c1e9c83fc29478f83dc4f6806f01b0bf4ee4dc5e847d6c0f4a02cd026026dc999e639fe838ed05d2a473d6172d4baf778f5d734f507e

  • SSDEEP

    24576:Ty/GP5U0RRKPZvcyYdS/u9NQhFU07Ww0scderHx9Ix+DSK8i:m/GP/KCHSFUJw0d2Ix+DSK8

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      1dbcf9f48347579ef514c4c70c8e4bdc03ef98a9be2e38fddb12b093dbaf1149

    • Size

      1.1MB

    • MD5

      717cb965297e8422867936184fdda328

    • SHA1

      30f46a92c83c1308bddd17acf7b667d74219a823

    • SHA256

      1dbcf9f48347579ef514c4c70c8e4bdc03ef98a9be2e38fddb12b093dbaf1149

    • SHA512

      2f97643ef608211e5031c1e9c83fc29478f83dc4f6806f01b0bf4ee4dc5e847d6c0f4a02cd026026dc999e639fe838ed05d2a473d6172d4baf778f5d734f507e

    • SSDEEP

      24576:Ty/GP5U0RRKPZvcyYdS/u9NQhFU07Ww0scderHx9Ix+DSK8i:m/GP/KCHSFUJw0d2Ix+DSK8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks