General

  • Target

    e1edd803aa2a2a18b0b0059f4b7bed51106f69fd0f403fb60a71611cbddf05cb

  • Size

    480KB

  • Sample

    241109-ardzsswkdn

  • MD5

    a8888afdb2e964791fde75cc7344a66b

  • SHA1

    630c74ddac41a749941e7f7b769202fb6f4f462a

  • SHA256

    e1edd803aa2a2a18b0b0059f4b7bed51106f69fd0f403fb60a71611cbddf05cb

  • SHA512

    bb6fc4333ec3b88466beba09547b10283cc2e6abe8369f4827eb3d5c3ac6aed8639b48361d027aa46cb47aa2a83355fb549c813a22ec0faaa3c6f5f93e058a8f

  • SSDEEP

    12288:DMrAy90cXQu9gXSqfh/aeYGBK0SLM62Nn:zyNYSqtBYGBKgx

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      e1edd803aa2a2a18b0b0059f4b7bed51106f69fd0f403fb60a71611cbddf05cb

    • Size

      480KB

    • MD5

      a8888afdb2e964791fde75cc7344a66b

    • SHA1

      630c74ddac41a749941e7f7b769202fb6f4f462a

    • SHA256

      e1edd803aa2a2a18b0b0059f4b7bed51106f69fd0f403fb60a71611cbddf05cb

    • SHA512

      bb6fc4333ec3b88466beba09547b10283cc2e6abe8369f4827eb3d5c3ac6aed8639b48361d027aa46cb47aa2a83355fb549c813a22ec0faaa3c6f5f93e058a8f

    • SSDEEP

      12288:DMrAy90cXQu9gXSqfh/aeYGBK0SLM62Nn:zyNYSqtBYGBKgx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks