General

  • Target

    50c1a986d1fcc19fdcca2c670e71ab09488ec151f9a8bfce488c79412226db81

  • Size

    480KB

  • Sample

    241109-xwyakazjg1

  • MD5

    5e718506cda1fb1efb59a260e9b62f14

  • SHA1

    6f956652e7ae724598314c2361c5da54e2d11612

  • SHA256

    50c1a986d1fcc19fdcca2c670e71ab09488ec151f9a8bfce488c79412226db81

  • SHA512

    e61426ad8425c7c57f520658b9c681d20b0bc4a2c6e5602524823717e70ec7be1e11e767aa5aa16412b4d98970a94427af7eb7e1cffd93b9569371d69b7d6edc

  • SSDEEP

    6144:Kxy+bnr+sp0yN90QE/jeWEuZpFA6iHElA1uJ3hvMubMs14KyAmvo3JnPoix5DRD1:/MrUy90VHewRv9soLpw10Z

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      50c1a986d1fcc19fdcca2c670e71ab09488ec151f9a8bfce488c79412226db81

    • Size

      480KB

    • MD5

      5e718506cda1fb1efb59a260e9b62f14

    • SHA1

      6f956652e7ae724598314c2361c5da54e2d11612

    • SHA256

      50c1a986d1fcc19fdcca2c670e71ab09488ec151f9a8bfce488c79412226db81

    • SHA512

      e61426ad8425c7c57f520658b9c681d20b0bc4a2c6e5602524823717e70ec7be1e11e767aa5aa16412b4d98970a94427af7eb7e1cffd93b9569371d69b7d6edc

    • SSDEEP

      6144:Kxy+bnr+sp0yN90QE/jeWEuZpFA6iHElA1uJ3hvMubMs14KyAmvo3JnPoix5DRD1:/MrUy90VHewRv9soLpw10Z

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks