General

  • Target

    c63f3f1a88c916f389a65ddf7ebb936f8d54fbabf1f279024984c0461d6509b9

  • Size

    1.1MB

  • Sample

    241109-zy9gqa1pcw

  • MD5

    f2d54fa7224fb53bd76d036bb6c7352b

  • SHA1

    25bd31c8543365c8b9db00bd4f4ed1a66f705b3e

  • SHA256

    c63f3f1a88c916f389a65ddf7ebb936f8d54fbabf1f279024984c0461d6509b9

  • SHA512

    e02d215508aea0938a03d77598aea85b908b9b6dca344a9bce97c04010949e45f3bf10c244a2dd15ac8f6047e80901bbab253dd56c5cb3b265513b011291c71c

  • SSDEEP

    24576:7y4Tq7v34wOVFiRWkN8+4/vtCu7GBwok60RiDfiJSspoV+dFOgxPhi2:u863JnWkG+RwzFtSs6APd6

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      c63f3f1a88c916f389a65ddf7ebb936f8d54fbabf1f279024984c0461d6509b9

    • Size

      1.1MB

    • MD5

      f2d54fa7224fb53bd76d036bb6c7352b

    • SHA1

      25bd31c8543365c8b9db00bd4f4ed1a66f705b3e

    • SHA256

      c63f3f1a88c916f389a65ddf7ebb936f8d54fbabf1f279024984c0461d6509b9

    • SHA512

      e02d215508aea0938a03d77598aea85b908b9b6dca344a9bce97c04010949e45f3bf10c244a2dd15ac8f6047e80901bbab253dd56c5cb3b265513b011291c71c

    • SSDEEP

      24576:7y4Tq7v34wOVFiRWkN8+4/vtCu7GBwok60RiDfiJSspoV+dFOgxPhi2:u863JnWkG+RwzFtSs6APd6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks