General

  • Target

    f20cf9192dee77d82577216ebe3ecf36bffdccbb84289084c68b244961b6c1f8

  • Size

    642KB

  • Sample

    241109-ytmlqa1elg

  • MD5

    c8d4dc3622df3240e200e550c863d6bd

  • SHA1

    f927979df880ebe8ae5cd2034c8917e3eb6ac1cc

  • SHA256

    f20cf9192dee77d82577216ebe3ecf36bffdccbb84289084c68b244961b6c1f8

  • SHA512

    9fa5c99e549b8e81554ba13401a6304ca939c710d33bee433a119ae764a0bbe362199a3c5ee4e6494081f67be6fc60fe821564c2ca4dffaec39ba096ffbb668e

  • SSDEEP

    12288:fMrRy90ZlpyxuLlHXg4akWDhYrRR8Pq6AlmXG0M54Qzgeq:CysLZXSmn8JvXTM5FO

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      f20cf9192dee77d82577216ebe3ecf36bffdccbb84289084c68b244961b6c1f8

    • Size

      642KB

    • MD5

      c8d4dc3622df3240e200e550c863d6bd

    • SHA1

      f927979df880ebe8ae5cd2034c8917e3eb6ac1cc

    • SHA256

      f20cf9192dee77d82577216ebe3ecf36bffdccbb84289084c68b244961b6c1f8

    • SHA512

      9fa5c99e549b8e81554ba13401a6304ca939c710d33bee433a119ae764a0bbe362199a3c5ee4e6494081f67be6fc60fe821564c2ca4dffaec39ba096ffbb668e

    • SSDEEP

      12288:fMrRy90ZlpyxuLlHXg4akWDhYrRR8Pq6AlmXG0M54Qzgeq:CysLZXSmn8JvXTM5FO

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks