General

  • Target

    cf292d8efe307ac63bd086070db358d427d32e3f6add0c8d5a4e5f59075ba4c8

  • Size

    479KB

  • Sample

    241110-1vskgawgle

  • MD5

    6d22d7adc20db40e855f646cb686b7e6

  • SHA1

    c0b1dbb953410c19d3787cb07bb970fa968510db

  • SHA256

    cf292d8efe307ac63bd086070db358d427d32e3f6add0c8d5a4e5f59075ba4c8

  • SHA512

    7a540234d66e46bbff94fce6ef48fcda0a16bc9e3b2c491e36b4e03adce7192e049ebf9c1e21bc6b8551c22f35eaecea5fca751667ff933c8e5e048d16142b18

  • SSDEEP

    12288:xMrey90N7xyQ/WVSV4jObrROMoz4Kv7ogqwr0m3:LyI7xyQewrbrROMozXohwwG

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      cf292d8efe307ac63bd086070db358d427d32e3f6add0c8d5a4e5f59075ba4c8

    • Size

      479KB

    • MD5

      6d22d7adc20db40e855f646cb686b7e6

    • SHA1

      c0b1dbb953410c19d3787cb07bb970fa968510db

    • SHA256

      cf292d8efe307ac63bd086070db358d427d32e3f6add0c8d5a4e5f59075ba4c8

    • SHA512

      7a540234d66e46bbff94fce6ef48fcda0a16bc9e3b2c491e36b4e03adce7192e049ebf9c1e21bc6b8551c22f35eaecea5fca751667ff933c8e5e048d16142b18

    • SSDEEP

      12288:xMrey90N7xyQ/WVSV4jObrROMoz4Kv7ogqwr0m3:LyI7xyQewrbrROMozXohwwG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks