General

  • Target

    2834e05e948b472d4f81a84f14481b28834be02eb9699b5b65119149940d2a24

  • Size

    480KB

  • Sample

    241109-qfepysxqdn

  • MD5

    06cd6a0acf2f9da9256fcd4ecd4f1eb2

  • SHA1

    c723cff644ed36b6ae25c0d7d415dcfb37721b46

  • SHA256

    2834e05e948b472d4f81a84f14481b28834be02eb9699b5b65119149940d2a24

  • SHA512

    7eb5363a434db3860471d4d97fbb7f0761497efb5b95035b0433f183d39fbb809e974656703838cedb68acb3142c09d1b015666635527bbfd5fdeb0fc80a7cd3

  • SSDEEP

    6144:KJy+bnr+Sp0yN90QEataY1qMCo5NeWsPYG8MpS11Z/NMRdL3jqLXwbkx9uF+KTdT:nMrey90oPTAYr11Z/NK1KwbYuw+hKly

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      2834e05e948b472d4f81a84f14481b28834be02eb9699b5b65119149940d2a24

    • Size

      480KB

    • MD5

      06cd6a0acf2f9da9256fcd4ecd4f1eb2

    • SHA1

      c723cff644ed36b6ae25c0d7d415dcfb37721b46

    • SHA256

      2834e05e948b472d4f81a84f14481b28834be02eb9699b5b65119149940d2a24

    • SHA512

      7eb5363a434db3860471d4d97fbb7f0761497efb5b95035b0433f183d39fbb809e974656703838cedb68acb3142c09d1b015666635527bbfd5fdeb0fc80a7cd3

    • SSDEEP

      6144:KJy+bnr+Sp0yN90QEataY1qMCo5NeWsPYG8MpS11Z/NMRdL3jqLXwbkx9uF+KTdT:nMrey90oPTAYr11Z/NK1KwbYuw+hKly

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks