General

  • Target

    266f195e4d48c6f900bba776482771fc3432a829fd94c52468bc04b3b1c046a7

  • Size

    1.1MB

  • Sample

    241108-tla6havfjc

  • MD5

    efe0e98f522ddb7825ad38ab05792650

  • SHA1

    b983b16f98e68b7bc58492d7c392e932491699e1

  • SHA256

    266f195e4d48c6f900bba776482771fc3432a829fd94c52468bc04b3b1c046a7

  • SHA512

    99a5f8f0c7cefcabc1d3304e7c2ad165dd7659f008a085aa47b3ba2de5e734987148011c06e54775ee746dd99fca85f05cf03a4285d7bc8e95a21974b00e863d

  • SSDEEP

    24576:Dyq+jEEJvyd0/N/ABxsRHqhPFASfj5yTvhvqU61fEnuIs:WqEEEkd0/N/AwqFb5qZC3U

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      266f195e4d48c6f900bba776482771fc3432a829fd94c52468bc04b3b1c046a7

    • Size

      1.1MB

    • MD5

      efe0e98f522ddb7825ad38ab05792650

    • SHA1

      b983b16f98e68b7bc58492d7c392e932491699e1

    • SHA256

      266f195e4d48c6f900bba776482771fc3432a829fd94c52468bc04b3b1c046a7

    • SHA512

      99a5f8f0c7cefcabc1d3304e7c2ad165dd7659f008a085aa47b3ba2de5e734987148011c06e54775ee746dd99fca85f05cf03a4285d7bc8e95a21974b00e863d

    • SSDEEP

      24576:Dyq+jEEJvyd0/N/ABxsRHqhPFASfj5yTvhvqU61fEnuIs:WqEEEkd0/N/AwqFb5qZC3U

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks