General

  • Target

    350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498

  • Size

    479KB

  • Sample

    241110-1hnqrayngq

  • MD5

    4f4a78bc173342550892aac84bd2d00d

  • SHA1

    374c3746dc3d34eb00a4e2689722cb233a667f03

  • SHA256

    350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498

  • SHA512

    fb2e8b3b50da4ce47458f806a523d041af7c6577d92a44531eab2a58718349a12968ebc26c1f5c6477680cdfbc579360c1cf7b2f6dd12327c6c954fe128d2c5f

  • SSDEEP

    6144:KOy+bnr+Op0yN90QEmNGwjUaOkE64LFZ2mFfwMweTxvBkkWxTDZT4/0alUduJJs6:yMrqy90YNJI054Lx4KxuD5dUsndKZ

Malware Config

Extracted

Family

redline

Botnet

dippo

C2

217.196.96.102:4132

Attributes
  • auth_value

    79490ff628fd6af3b29170c3c163874b

Targets

    • Target

      350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498

    • Size

      479KB

    • MD5

      4f4a78bc173342550892aac84bd2d00d

    • SHA1

      374c3746dc3d34eb00a4e2689722cb233a667f03

    • SHA256

      350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498

    • SHA512

      fb2e8b3b50da4ce47458f806a523d041af7c6577d92a44531eab2a58718349a12968ebc26c1f5c6477680cdfbc579360c1cf7b2f6dd12327c6c954fe128d2c5f

    • SSDEEP

      6144:KOy+bnr+Op0yN90QEmNGwjUaOkE64LFZ2mFfwMweTxvBkkWxTDZT4/0alUduJJs6:yMrqy90YNJI054Lx4KxuD5dUsndKZ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks