General

  • Target

    ad8217d06ef8ce210e71fc6284ad41e47f87ea025b5b9ec37d84315ca61b4444

  • Size

    556KB

  • Sample

    241109-yws7aazqew

  • MD5

    97260190c2c11f87f7902c1b8d4928ff

  • SHA1

    f0106260bcc6a68010d1e64d343d6cc8b82b873f

  • SHA256

    ad8217d06ef8ce210e71fc6284ad41e47f87ea025b5b9ec37d84315ca61b4444

  • SHA512

    bd0a143b80b872d1743b07f755410feb3b2a6977626837c0f32f4a4c5d1ad1877ea66c277717c5d6a6a57c7d97a12cc6bf76aac5910094ac4f887507feba7f47

  • SSDEEP

    12288:kMrly90cHacUq+GX37xncOyimlyJGHxhaGhz1tpfKKs15:hyLX37xncOyKQrhzrE/H

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      ad8217d06ef8ce210e71fc6284ad41e47f87ea025b5b9ec37d84315ca61b4444

    • Size

      556KB

    • MD5

      97260190c2c11f87f7902c1b8d4928ff

    • SHA1

      f0106260bcc6a68010d1e64d343d6cc8b82b873f

    • SHA256

      ad8217d06ef8ce210e71fc6284ad41e47f87ea025b5b9ec37d84315ca61b4444

    • SHA512

      bd0a143b80b872d1743b07f755410feb3b2a6977626837c0f32f4a4c5d1ad1877ea66c277717c5d6a6a57c7d97a12cc6bf76aac5910094ac4f887507feba7f47

    • SSDEEP

      12288:kMrly90cHacUq+GX37xncOyimlyJGHxhaGhz1tpfKKs15:hyLX37xncOyKQrhzrE/H

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks