General

  • Target

    1a89bcb3e53fb8905dc135894bd0c6c7b4e9973c0344f7de821ac01eb2027c0d

  • Size

    566KB

  • Sample

    241109-t8ky8aybnr

  • MD5

    3014af9290f9d43588554068778d744f

  • SHA1

    95bd8bdea7380cd8d160aa549a7a09f8d05b9799

  • SHA256

    1a89bcb3e53fb8905dc135894bd0c6c7b4e9973c0344f7de821ac01eb2027c0d

  • SHA512

    414572ce05371ff5eeb76ed1fb7943bf7d751e5cf9bcf81d82ece6c7833714c1d47e01a2d4613de8546a97ec3e32af67a9ee6e21dd5de38faddc8536e88452fe

  • SSDEEP

    12288:sMrdy90Q0GYaEmOwintl8ERt0wrEejFQ+ZOkHs9eqAEXd:ZyBqlMOlzjrEejm+ZOkgDAW

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      1a89bcb3e53fb8905dc135894bd0c6c7b4e9973c0344f7de821ac01eb2027c0d

    • Size

      566KB

    • MD5

      3014af9290f9d43588554068778d744f

    • SHA1

      95bd8bdea7380cd8d160aa549a7a09f8d05b9799

    • SHA256

      1a89bcb3e53fb8905dc135894bd0c6c7b4e9973c0344f7de821ac01eb2027c0d

    • SHA512

      414572ce05371ff5eeb76ed1fb7943bf7d751e5cf9bcf81d82ece6c7833714c1d47e01a2d4613de8546a97ec3e32af67a9ee6e21dd5de38faddc8536e88452fe

    • SSDEEP

      12288:sMrdy90Q0GYaEmOwintl8ERt0wrEejFQ+ZOkHs9eqAEXd:ZyBqlMOlzjrEejm+ZOkgDAW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks