General

  • Target

    149c152a432c01826357b3d412a284afbd0d9431b22aedb88eb8f4a8d7a50e24

  • Size

    1.1MB

  • Sample

    241108-vzmxwsvqcs

  • MD5

    7a428f5a0a64a069377d568f5011475a

  • SHA1

    4198ea3ce7c29d42fed9fe78f1b966133175ac2b

  • SHA256

    149c152a432c01826357b3d412a284afbd0d9431b22aedb88eb8f4a8d7a50e24

  • SHA512

    0f4a2999d03695fb01bf9191c4930d663c2008eb0cf701bb2aa81627c1f89fc0b6fd4bff8cae3cb19f26ba1f3004dbc374ffe37a3939a57a8e5c1434d04a9c54

  • SSDEEP

    24576:iygtDGiWmftoL2QtjcdlJHPrWWYfB1RJ0B0:JgtCiWmtoaQCljWWYpCB

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      149c152a432c01826357b3d412a284afbd0d9431b22aedb88eb8f4a8d7a50e24

    • Size

      1.1MB

    • MD5

      7a428f5a0a64a069377d568f5011475a

    • SHA1

      4198ea3ce7c29d42fed9fe78f1b966133175ac2b

    • SHA256

      149c152a432c01826357b3d412a284afbd0d9431b22aedb88eb8f4a8d7a50e24

    • SHA512

      0f4a2999d03695fb01bf9191c4930d663c2008eb0cf701bb2aa81627c1f89fc0b6fd4bff8cae3cb19f26ba1f3004dbc374ffe37a3939a57a8e5c1434d04a9c54

    • SSDEEP

      24576:iygtDGiWmftoL2QtjcdlJHPrWWYfB1RJ0B0:JgtCiWmtoaQCljWWYpCB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks