General

  • Target

    a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a

  • Size

    642KB

  • Sample

    241109-3xatjstpew

  • MD5

    ec295c3f47a4605dc55b9dbf2e8e81bb

  • SHA1

    87ca6686af19ab2ec8c0b3ac9ec4d2b2989842d1

  • SHA256

    a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a

  • SHA512

    9e40114850ac95abd3ea8333fd5668d9e8383557bf524e4fb8dff3d0f5e97fe3bd074bd4461339534358ecab1889587e3ab41ea9509d3503667d43a8607888c8

  • SSDEEP

    12288:LMrVy90xCe0bduMxZ1byiHCgVB3zxhYnuR88HpvmwDsz8WOJu5pxhN2DJ:OySkLbyWC89+48MsiC5pxz2DJ

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a

    • Size

      642KB

    • MD5

      ec295c3f47a4605dc55b9dbf2e8e81bb

    • SHA1

      87ca6686af19ab2ec8c0b3ac9ec4d2b2989842d1

    • SHA256

      a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a

    • SHA512

      9e40114850ac95abd3ea8333fd5668d9e8383557bf524e4fb8dff3d0f5e97fe3bd074bd4461339534358ecab1889587e3ab41ea9509d3503667d43a8607888c8

    • SSDEEP

      12288:LMrVy90xCe0bduMxZ1byiHCgVB3zxhYnuR88HpvmwDsz8WOJu5pxhN2DJ:OySkLbyWC89+48MsiC5pxz2DJ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks