General

  • Target

    d5ef4a11b4172b81d43ffa684090a87693f191377890f6767878166580155716

  • Size

    556KB

  • Sample

    241109-ywenws1epb

  • MD5

    7dd305a12097da70cb4320313cb873bc

  • SHA1

    0fd4f1ebafa0c24b4387442137b1c5a922a14921

  • SHA256

    d5ef4a11b4172b81d43ffa684090a87693f191377890f6767878166580155716

  • SHA512

    478b4ff97a0bc73037885b4173018367d7ef7092bc86f15725d5f317fbc382d4c6f18bff677f8ee0d87dcdebfc37af070f9195252c341bba7aaac9170f23f8f8

  • SSDEEP

    12288:HMrUy90ElnZLWrzbC95rwcIzxmXgu/TORjmfz4LM2/u3Y90:Lywa8NmXgu/ydmfz4o2GIu

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      d5ef4a11b4172b81d43ffa684090a87693f191377890f6767878166580155716

    • Size

      556KB

    • MD5

      7dd305a12097da70cb4320313cb873bc

    • SHA1

      0fd4f1ebafa0c24b4387442137b1c5a922a14921

    • SHA256

      d5ef4a11b4172b81d43ffa684090a87693f191377890f6767878166580155716

    • SHA512

      478b4ff97a0bc73037885b4173018367d7ef7092bc86f15725d5f317fbc382d4c6f18bff677f8ee0d87dcdebfc37af070f9195252c341bba7aaac9170f23f8f8

    • SSDEEP

      12288:HMrUy90ElnZLWrzbC95rwcIzxmXgu/TORjmfz4LM2/u3Y90:Lywa8NmXgu/ydmfz4o2GIu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks