General

  • Target

    c0c9734f3cde7c48ddb421c65a2216172032d49ba6293375bfecf6ac836dc06a

  • Size

    556KB

  • Sample

    241109-y18grs1fll

  • MD5

    5ffaef4554b156412c7c7ba10254b3d7

  • SHA1

    5a427d5209c5f8b2b1daa76ff69cea3b33103f20

  • SHA256

    c0c9734f3cde7c48ddb421c65a2216172032d49ba6293375bfecf6ac836dc06a

  • SHA512

    ff9f1a0a37a0d9acb3a99e51849d147f1f566fabed02356d9bb1b156b6933ded5d6232407898884e55c5950154e59190127e719d27c81ef6af5bbd501e49efe5

  • SSDEEP

    12288:rMrQy90XVn5zOcMfuXzqYko0huAXm02XoG9/HmyE:DyYV5XM/Yko0h712YG9/GyE

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      c0c9734f3cde7c48ddb421c65a2216172032d49ba6293375bfecf6ac836dc06a

    • Size

      556KB

    • MD5

      5ffaef4554b156412c7c7ba10254b3d7

    • SHA1

      5a427d5209c5f8b2b1daa76ff69cea3b33103f20

    • SHA256

      c0c9734f3cde7c48ddb421c65a2216172032d49ba6293375bfecf6ac836dc06a

    • SHA512

      ff9f1a0a37a0d9acb3a99e51849d147f1f566fabed02356d9bb1b156b6933ded5d6232407898884e55c5950154e59190127e719d27c81ef6af5bbd501e49efe5

    • SSDEEP

      12288:rMrQy90XVn5zOcMfuXzqYko0huAXm02XoG9/HmyE:DyYV5XM/Yko0h712YG9/GyE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks