General

  • Target

    1fd090c03bec25aa9d8ee557ed02722853d6c92cd5c1d8fce1cd057f92a3b3e0

  • Size

    168KB

  • Sample

    241109-y6g7rs1jbz

  • MD5

    baff1d84bc45510f8f5c5a2195591d4f

  • SHA1

    c6a6e5a51aa1859add0941b231c982b56ec7da2d

  • SHA256

    1fd090c03bec25aa9d8ee557ed02722853d6c92cd5c1d8fce1cd057f92a3b3e0

  • SHA512

    a8d89c9ac8dcc7874a654f5342b18941beda09417f2e66d4ff4b5c0e22ace7ee1eb913f58ac38449c7d0b5eba430a3b183788044ab70fe0062793abcb0b9447c

  • SSDEEP

    1536:8HHDXepqlVZRGWnKarISqKkH1jgl3mfTGqVibutZFryIaQ383wYkz8e8hg:yOMcSqKEoWyqV2MFeIaQ3t8e8hg

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      1fd090c03bec25aa9d8ee557ed02722853d6c92cd5c1d8fce1cd057f92a3b3e0

    • Size

      168KB

    • MD5

      baff1d84bc45510f8f5c5a2195591d4f

    • SHA1

      c6a6e5a51aa1859add0941b231c982b56ec7da2d

    • SHA256

      1fd090c03bec25aa9d8ee557ed02722853d6c92cd5c1d8fce1cd057f92a3b3e0

    • SHA512

      a8d89c9ac8dcc7874a654f5342b18941beda09417f2e66d4ff4b5c0e22ace7ee1eb913f58ac38449c7d0b5eba430a3b183788044ab70fe0062793abcb0b9447c

    • SSDEEP

      1536:8HHDXepqlVZRGWnKarISqKkH1jgl3mfTGqVibutZFryIaQ383wYkz8e8hg:yOMcSqKEoWyqV2MFeIaQ3t8e8hg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks