General

  • Target

    367ced3a6d4222ac3cf0994d9006e4f7257c49756e13df218a398bc03efb3156

  • Size

    479KB

  • Sample

    241109-fqz4jaxmhs

  • MD5

    f3c31cb66212f8706afadcb867c49ee9

  • SHA1

    e14d7ca12ab0accd0b2dc287e2869e9ba2fd042a

  • SHA256

    367ced3a6d4222ac3cf0994d9006e4f7257c49756e13df218a398bc03efb3156

  • SHA512

    16b000c843844c78f4011e87105a6d5a1dc6c4c1eafec29aa2cf93df92c946e5078ea388618db5939fb2cdd33ede96a193d6a0bed8e101ab445918bcbebe428d

  • SSDEEP

    12288:pMrKy90kgXRoVZ8On1S6wmNrf8BkTI6xerzWfl5OmBN4jN/:fySRoj3n4CNz89h80mojN/

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      367ced3a6d4222ac3cf0994d9006e4f7257c49756e13df218a398bc03efb3156

    • Size

      479KB

    • MD5

      f3c31cb66212f8706afadcb867c49ee9

    • SHA1

      e14d7ca12ab0accd0b2dc287e2869e9ba2fd042a

    • SHA256

      367ced3a6d4222ac3cf0994d9006e4f7257c49756e13df218a398bc03efb3156

    • SHA512

      16b000c843844c78f4011e87105a6d5a1dc6c4c1eafec29aa2cf93df92c946e5078ea388618db5939fb2cdd33ede96a193d6a0bed8e101ab445918bcbebe428d

    • SSDEEP

      12288:pMrKy90kgXRoVZ8On1S6wmNrf8BkTI6xerzWfl5OmBN4jN/:fySRoj3n4CNz89h80mojN/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks