General

  • Target

    fde197adb73b299681bb6c548551dc0b6d7853813b9851c3e173a7b83786cb1bN

  • Size

    553KB

  • Sample

    241109-slf63swkaw

  • MD5

    383c6b52f79032e3708bd84aba0cdb50

  • SHA1

    0ae36b70ce99fb2f76913735bab148413cb6dffc

  • SHA256

    fde197adb73b299681bb6c548551dc0b6d7853813b9851c3e173a7b83786cb1b

  • SHA512

    483c9bf56301f50ef9f3f468a57d146348a9b81a861a615531f27555f6fa520c1209c95f388a4b86dd51cdeec8a72cac1edf2011e27569da0c04dcef4b9a3f13

  • SSDEEP

    12288:IMrky90vBFNlsHbHWHMgJA12Y2O9wx7h41:MyavCHaMJ12jO9w/y

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      fde197adb73b299681bb6c548551dc0b6d7853813b9851c3e173a7b83786cb1bN

    • Size

      553KB

    • MD5

      383c6b52f79032e3708bd84aba0cdb50

    • SHA1

      0ae36b70ce99fb2f76913735bab148413cb6dffc

    • SHA256

      fde197adb73b299681bb6c548551dc0b6d7853813b9851c3e173a7b83786cb1b

    • SHA512

      483c9bf56301f50ef9f3f468a57d146348a9b81a861a615531f27555f6fa520c1209c95f388a4b86dd51cdeec8a72cac1edf2011e27569da0c04dcef4b9a3f13

    • SSDEEP

      12288:IMrky90vBFNlsHbHWHMgJA12Y2O9wx7h41:MyavCHaMJ12jO9w/y

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks