General

  • Target

    cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84

  • Size

    566KB

  • Sample

    241109-s99hjaxepm

  • MD5

    7e7a7983f9b2f4b636d585d4e4afce28

  • SHA1

    56d0aa2551344348cfe149a4b8afb1759bf10e2a

  • SHA256

    cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84

  • SHA512

    4b06c8b6380d11f98fc58bfa1a40988fc112dc8085a109d33c04e57c8309af800e88025e4b00b3b335b510f893b545bd7c28c354cf11a1fc0921ec4e598f766f

  • SSDEEP

    12288:JMrZy90CdqIM0WX1w80BOjNyEWMznC/bAC9jGhjEm:gyx6L0BOj0SzC/0CY/

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84

    • Size

      566KB

    • MD5

      7e7a7983f9b2f4b636d585d4e4afce28

    • SHA1

      56d0aa2551344348cfe149a4b8afb1759bf10e2a

    • SHA256

      cb0547db1baf3145a06c90e4b779b8af36b1df0ac4c721d3fb7eaff4c0270f84

    • SHA512

      4b06c8b6380d11f98fc58bfa1a40988fc112dc8085a109d33c04e57c8309af800e88025e4b00b3b335b510f893b545bd7c28c354cf11a1fc0921ec4e598f766f

    • SSDEEP

      12288:JMrZy90CdqIM0WX1w80BOjNyEWMznC/bAC9jGhjEm:gyx6L0BOj0SzC/0CY/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks