General

  • Target

    cfb580976e827ca37db2fa8b4709feec0be54c6d15769d16b28d409ce93b8259

  • Size

    642KB

  • Sample

    241109-vbqc4sybjc

  • MD5

    0e581c36df666d2d8842479d6174618b

  • SHA1

    30b7a40ef6a83d18cfa0e9de70ecf1e4786b258f

  • SHA256

    cfb580976e827ca37db2fa8b4709feec0be54c6d15769d16b28d409ce93b8259

  • SHA512

    8d21be74d53cb70d7ecf919d70dee455e0e47d65d5e1642195dc78e764c6c5e876890058e8b16393ae29e0b856133f857a8bcf1055d9443571bb48f4237e79b6

  • SSDEEP

    12288:BMrUy90+HubVLXHHNglyn2sNMS8ljTdtEhSkqci0nHH:VynHubpXnNXn2V1jTdySx0nHH

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      cfb580976e827ca37db2fa8b4709feec0be54c6d15769d16b28d409ce93b8259

    • Size

      642KB

    • MD5

      0e581c36df666d2d8842479d6174618b

    • SHA1

      30b7a40ef6a83d18cfa0e9de70ecf1e4786b258f

    • SHA256

      cfb580976e827ca37db2fa8b4709feec0be54c6d15769d16b28d409ce93b8259

    • SHA512

      8d21be74d53cb70d7ecf919d70dee455e0e47d65d5e1642195dc78e764c6c5e876890058e8b16393ae29e0b856133f857a8bcf1055d9443571bb48f4237e79b6

    • SSDEEP

      12288:BMrUy90+HubVLXHHNglyn2sNMS8ljTdtEhSkqci0nHH:VynHubpXnNXn2V1jTdySx0nHH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks