General

  • Target

    6b936d40bd556012bcdbb8d431554a788dac4daf29a6364fa3686a3d6026c7cf

  • Size

    479KB

  • Sample

    241109-f6qj2a1pcp

  • MD5

    3a0bcf00651205a76d32ce7882c41d9d

  • SHA1

    808cca2c9411cb80fb0a96424b71f916736cdc01

  • SHA256

    6b936d40bd556012bcdbb8d431554a788dac4daf29a6364fa3686a3d6026c7cf

  • SHA512

    e547b154de411309ff0472aaf98262cffa9b983794d10f5fcd62f14f218fcbcfe38a7493c9b2067dde1bd62a0e09375927a3e634704003eb2dba8d6d4215a85a

  • SSDEEP

    12288:8MrPy90lxVVKkXEzjxJnsbt6B78bE1EK7sbgBsJm:jyMxjK7/xJnsXovAbgBsA

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      6b936d40bd556012bcdbb8d431554a788dac4daf29a6364fa3686a3d6026c7cf

    • Size

      479KB

    • MD5

      3a0bcf00651205a76d32ce7882c41d9d

    • SHA1

      808cca2c9411cb80fb0a96424b71f916736cdc01

    • SHA256

      6b936d40bd556012bcdbb8d431554a788dac4daf29a6364fa3686a3d6026c7cf

    • SHA512

      e547b154de411309ff0472aaf98262cffa9b983794d10f5fcd62f14f218fcbcfe38a7493c9b2067dde1bd62a0e09375927a3e634704003eb2dba8d6d4215a85a

    • SSDEEP

      12288:8MrPy90lxVVKkXEzjxJnsbt6B78bE1EK7sbgBsJm:jyMxjK7/xJnsXovAbgBsA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks