General

  • Target

    423e0de5ca1b91251de96f06caad1ebacad7559314477ab6b5c698c096b09be7

  • Size

    1.1MB

  • Sample

    241108-vey5eswckn

  • MD5

    325fdd6ab163573076def370b57efcbb

  • SHA1

    ddfaaeab80038d461c66a792b13257b26b299714

  • SHA256

    423e0de5ca1b91251de96f06caad1ebacad7559314477ab6b5c698c096b09be7

  • SHA512

    4c95326396a01e72c8828e4b8ebc08fd7a22eabd30fbdaf927337c76f81a27cb709f4a5822a51d0787de801147f46dced26a82abe5863d6ef03e500a3695edd6

  • SSDEEP

    24576:DyCqg4uVZaJDPfJZYUQdKrMsf9Sxuu9WIjmbU:WCqkPaJTfqdKH9SxNWQ

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      423e0de5ca1b91251de96f06caad1ebacad7559314477ab6b5c698c096b09be7

    • Size

      1.1MB

    • MD5

      325fdd6ab163573076def370b57efcbb

    • SHA1

      ddfaaeab80038d461c66a792b13257b26b299714

    • SHA256

      423e0de5ca1b91251de96f06caad1ebacad7559314477ab6b5c698c096b09be7

    • SHA512

      4c95326396a01e72c8828e4b8ebc08fd7a22eabd30fbdaf927337c76f81a27cb709f4a5822a51d0787de801147f46dced26a82abe5863d6ef03e500a3695edd6

    • SSDEEP

      24576:DyCqg4uVZaJDPfJZYUQdKrMsf9Sxuu9WIjmbU:WCqkPaJTfqdKH9SxNWQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks