General

  • Target

    ed02934e545516a483096b2ef2a07f8f3f3264f649dd8fd24f1384395eb4b44a

  • Size

    1.1MB

  • Sample

    241109-3n5bssvclk

  • MD5

    48089d103fe5cb19db9548d078c91997

  • SHA1

    237a8ba9db025f9e373651e77e9cc5b219d7b6c8

  • SHA256

    ed02934e545516a483096b2ef2a07f8f3f3264f649dd8fd24f1384395eb4b44a

  • SHA512

    d307892afba4423819e6a2dcb61c6a35caec252a2054a1eab1dc3b95ab7484d09c4b35b0aeed4e810cc7d1dd53f2c1ba9002cc9e5efadc7dc67eb0587800e90d

  • SSDEEP

    24576:dyYB7dkXHVjuEvRAVnvd6Xwz0S7MUuw4Qys7BOWo01T:4YB7dkXHVjuQAH6XwzpXX4QJ7cW

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      ed02934e545516a483096b2ef2a07f8f3f3264f649dd8fd24f1384395eb4b44a

    • Size

      1.1MB

    • MD5

      48089d103fe5cb19db9548d078c91997

    • SHA1

      237a8ba9db025f9e373651e77e9cc5b219d7b6c8

    • SHA256

      ed02934e545516a483096b2ef2a07f8f3f3264f649dd8fd24f1384395eb4b44a

    • SHA512

      d307892afba4423819e6a2dcb61c6a35caec252a2054a1eab1dc3b95ab7484d09c4b35b0aeed4e810cc7d1dd53f2c1ba9002cc9e5efadc7dc67eb0587800e90d

    • SSDEEP

      24576:dyYB7dkXHVjuEvRAVnvd6Xwz0S7MUuw4Qys7BOWo01T:4YB7dkXHVjuQAH6XwzpXX4QJ7cW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks