General

  • Target

    059bb835e66943d3d3524845fd652db6f390200b36b99fc2b2c8537913f2e35c

  • Size

    1.1MB

  • Sample

    241109-zzct5s1pc1

  • MD5

    99fd11f3267247fdd835e2a7931c2d3a

  • SHA1

    4cc7db8718fa56e37628a91e95ee7860f0a3a078

  • SHA256

    059bb835e66943d3d3524845fd652db6f390200b36b99fc2b2c8537913f2e35c

  • SHA512

    4354b87f59daed8455d1f429b9d5e523703ca99be0bb79aefc0fd3cf7d343ad1036c8a664ffb4ae95e2c8eec3366c2b34e002a367b8986a19ae708e235db825d

  • SSDEEP

    24576:9yV2cD/u7awHNZxn0nyX/IpdL+jw/9Ygmma4hjlJlbb5:YRDOt4+Ayw/9Ygmma4hB

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      059bb835e66943d3d3524845fd652db6f390200b36b99fc2b2c8537913f2e35c

    • Size

      1.1MB

    • MD5

      99fd11f3267247fdd835e2a7931c2d3a

    • SHA1

      4cc7db8718fa56e37628a91e95ee7860f0a3a078

    • SHA256

      059bb835e66943d3d3524845fd652db6f390200b36b99fc2b2c8537913f2e35c

    • SHA512

      4354b87f59daed8455d1f429b9d5e523703ca99be0bb79aefc0fd3cf7d343ad1036c8a664ffb4ae95e2c8eec3366c2b34e002a367b8986a19ae708e235db825d

    • SSDEEP

      24576:9yV2cD/u7awHNZxn0nyX/IpdL+jw/9Ygmma4hjlJlbb5:YRDOt4+Ayw/9Ygmma4hB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks