General

  • Target

    238f9f03fce21b4ba1e892f260e0d15971efbfeef5eb687144f097936dbf50fbN

  • Size

    1.3MB

  • Sample

    241110-12v9yazjhj

  • MD5

    b475bfb55d67b6954bb72968d33af570

  • SHA1

    e5a369212ffe1d23f34cfc9cac1aa9c6d2a1f729

  • SHA256

    238f9f03fce21b4ba1e892f260e0d15971efbfeef5eb687144f097936dbf50fb

  • SHA512

    778501769af3596c7577419a871fbc7dcbb3896848821121061468c6d3eb2db916f89331465a278f577a03c6cf58b2f059f20d9df2a2537cdb10d099db006834

  • SSDEEP

    24576:5ymQMx1KGFqP/G/+GXqMiwC/AE+XIroVTZfIWba4WwgdWiV2rN59:sugGye/iRAYmVbxWwyBYN5

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Targets

    • Target

      238f9f03fce21b4ba1e892f260e0d15971efbfeef5eb687144f097936dbf50fbN

    • Size

      1.3MB

    • MD5

      b475bfb55d67b6954bb72968d33af570

    • SHA1

      e5a369212ffe1d23f34cfc9cac1aa9c6d2a1f729

    • SHA256

      238f9f03fce21b4ba1e892f260e0d15971efbfeef5eb687144f097936dbf50fb

    • SHA512

      778501769af3596c7577419a871fbc7dcbb3896848821121061468c6d3eb2db916f89331465a278f577a03c6cf58b2f059f20d9df2a2537cdb10d099db006834

    • SSDEEP

      24576:5ymQMx1KGFqP/G/+GXqMiwC/AE+XIroVTZfIWba4WwgdWiV2rN59:sugGye/iRAYmVbxWwyBYN5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks