General

  • Target

    1dad1e9aceb0072f299b1be77087065e052870e3923e49f6ec86ba7bd3330024

  • Size

    1.1MB

  • Sample

    241108-ywhqjsyelc

  • MD5

    eb1e3f021d46185f9c2872fa029807ab

  • SHA1

    4a352d71f7556b8a845e0beca84219cbed19c0ed

  • SHA256

    1dad1e9aceb0072f299b1be77087065e052870e3923e49f6ec86ba7bd3330024

  • SHA512

    114682609bbbe5f89b882ceb8963af36a268173d6fc80084d7425bd964eba94495bab04678f620b915caf0cbe637370a9fca2802488312056b8ba13e3f97ffaa

  • SSDEEP

    24576:DyGugemunlXB/33SvhKSH20V3FEFYKhYgx/av3G6kDuhw:Weklx/3CpK83eCK18v3G6uuh

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      1dad1e9aceb0072f299b1be77087065e052870e3923e49f6ec86ba7bd3330024

    • Size

      1.1MB

    • MD5

      eb1e3f021d46185f9c2872fa029807ab

    • SHA1

      4a352d71f7556b8a845e0beca84219cbed19c0ed

    • SHA256

      1dad1e9aceb0072f299b1be77087065e052870e3923e49f6ec86ba7bd3330024

    • SHA512

      114682609bbbe5f89b882ceb8963af36a268173d6fc80084d7425bd964eba94495bab04678f620b915caf0cbe637370a9fca2802488312056b8ba13e3f97ffaa

    • SSDEEP

      24576:DyGugemunlXB/33SvhKSH20V3FEFYKhYgx/av3G6kDuhw:Weklx/3CpK83eCK18v3G6uuh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks