General

  • Target

    2a39ba3560c8b0c7c056b0ee6ecb882b59df42cef7acd5f751435db7fbb04b72

  • Size

    479KB

  • Sample

    241109-p7x5yavdmn

  • MD5

    f139b068e74a0d897c131cfa5e5210b3

  • SHA1

    d9df80a007e83b2d9ebe18099e26f64051d9d1c2

  • SHA256

    2a39ba3560c8b0c7c056b0ee6ecb882b59df42cef7acd5f751435db7fbb04b72

  • SHA512

    d332937dc52216cfc92de86e0cd55443bc4ba5d454c95e83c95de304482a743a38937bfa465dd95e4ab1b95cded781befe4bd19acb8fec3daeb31cac871b45a5

  • SSDEEP

    12288:rMrjy90orB9qF36Wmw78Acpv90R1I4cyVECXOz4V:AyTd9qRkLdedq4

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      2a39ba3560c8b0c7c056b0ee6ecb882b59df42cef7acd5f751435db7fbb04b72

    • Size

      479KB

    • MD5

      f139b068e74a0d897c131cfa5e5210b3

    • SHA1

      d9df80a007e83b2d9ebe18099e26f64051d9d1c2

    • SHA256

      2a39ba3560c8b0c7c056b0ee6ecb882b59df42cef7acd5f751435db7fbb04b72

    • SHA512

      d332937dc52216cfc92de86e0cd55443bc4ba5d454c95e83c95de304482a743a38937bfa465dd95e4ab1b95cded781befe4bd19acb8fec3daeb31cac871b45a5

    • SSDEEP

      12288:rMrjy90orB9qF36Wmw78Acpv90R1I4cyVECXOz4V:AyTd9qRkLdedq4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks