General

  • Target

    99f37d30fd14da3f0a86dd987648f08d14f66c8b308adb692258444c868ff70b

  • Size

    1.1MB

  • Sample

    241109-wtymwaylgs

  • MD5

    b768953f9f90e4326fb9aa2706cfb59b

  • SHA1

    810bb97f485c25e1c77650edb6af2f6d562ed9b8

  • SHA256

    99f37d30fd14da3f0a86dd987648f08d14f66c8b308adb692258444c868ff70b

  • SHA512

    a03ca0be11c9163d072cfb4adcd6a45d43a764f23d5a29df128fd3c2c8834c1088544725e15b1651b91a9d82cc78905ef23ac0d0dfc31b14a9d10fbf3425e5be

  • SSDEEP

    24576:/y7qWViUlIz7aiuPbecANOWEQMpkCosfUuPtaQEE4PePbbr:K7qHUlIzNuPbuEtmKfUQ7b

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      99f37d30fd14da3f0a86dd987648f08d14f66c8b308adb692258444c868ff70b

    • Size

      1.1MB

    • MD5

      b768953f9f90e4326fb9aa2706cfb59b

    • SHA1

      810bb97f485c25e1c77650edb6af2f6d562ed9b8

    • SHA256

      99f37d30fd14da3f0a86dd987648f08d14f66c8b308adb692258444c868ff70b

    • SHA512

      a03ca0be11c9163d072cfb4adcd6a45d43a764f23d5a29df128fd3c2c8834c1088544725e15b1651b91a9d82cc78905ef23ac0d0dfc31b14a9d10fbf3425e5be

    • SSDEEP

      24576:/y7qWViUlIz7aiuPbecANOWEQMpkCosfUuPtaQEE4PePbbr:K7qHUlIzNuPbuEtmKfUQ7b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks