General

  • Target

    5e036d0c319d25330117b35874fa093ca7ce8856ae1ecbbcc76033f02ce9d454

  • Size

    479KB

  • Sample

    241109-3jlnwstmfx

  • MD5

    4b70d69c9fcfc181ec126b3dbf5a2860

  • SHA1

    c4e88978ba10b4f74d935692d6de81f555477633

  • SHA256

    5e036d0c319d25330117b35874fa093ca7ce8856ae1ecbbcc76033f02ce9d454

  • SHA512

    383205980de49be7404c4bbe569a4701a57f3dd449e02a0021c2f177cd5e4c851eeb15bd78f363ec0b4eeb7f4f49a2bcedea0d99850c43431ee460c369c9c387

  • SSDEEP

    12288:EMrZty90v3BQA0bjffsLrww8YdjsN9eYFG7tFdj/7S45U:ltyxJzsvwwhK9PuFj/7S4a

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      5e036d0c319d25330117b35874fa093ca7ce8856ae1ecbbcc76033f02ce9d454

    • Size

      479KB

    • MD5

      4b70d69c9fcfc181ec126b3dbf5a2860

    • SHA1

      c4e88978ba10b4f74d935692d6de81f555477633

    • SHA256

      5e036d0c319d25330117b35874fa093ca7ce8856ae1ecbbcc76033f02ce9d454

    • SHA512

      383205980de49be7404c4bbe569a4701a57f3dd449e02a0021c2f177cd5e4c851eeb15bd78f363ec0b4eeb7f4f49a2bcedea0d99850c43431ee460c369c9c387

    • SSDEEP

      12288:EMrZty90v3BQA0bjffsLrww8YdjsN9eYFG7tFdj/7S45U:ltyxJzsvwwhK9PuFj/7S4a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks