General

  • Target

    45e5efb8b8be86e159ec9fb5464cad08b6f44a2b575ce9133594ddec57d831c8

  • Size

    1.1MB

  • Sample

    241110-1xpllavrh1

  • MD5

    621d389ad958da79407622bd1032b69a

  • SHA1

    a364a4df02dd4ce2ed8403d1dadfb612447979cd

  • SHA256

    45e5efb8b8be86e159ec9fb5464cad08b6f44a2b575ce9133594ddec57d831c8

  • SHA512

    ab0b26070da5cd89be5635d095a48d959b312acd3b65a4e28a038fbb99dd132f672a80bb0d7102f88d5b5a9e9cb7d9b2b5caeb6a44fd68874c18cd9183c6b827

  • SSDEEP

    24576:0yDzwZeLVPuwArniB0XQBcQkvnQ3jKUrN3pKANntmOFlk4exGV:DDzksVWwqtNQ3jKWgAR1FJc

Malware Config

Extracted

Family

redline

Botnet

dedu

C2

185.161.248.75:4132

Attributes
  • auth_value

    43fb2cf55df7896aeff6ce27ec070fea

Targets

    • Target

      45e5efb8b8be86e159ec9fb5464cad08b6f44a2b575ce9133594ddec57d831c8

    • Size

      1.1MB

    • MD5

      621d389ad958da79407622bd1032b69a

    • SHA1

      a364a4df02dd4ce2ed8403d1dadfb612447979cd

    • SHA256

      45e5efb8b8be86e159ec9fb5464cad08b6f44a2b575ce9133594ddec57d831c8

    • SHA512

      ab0b26070da5cd89be5635d095a48d959b312acd3b65a4e28a038fbb99dd132f672a80bb0d7102f88d5b5a9e9cb7d9b2b5caeb6a44fd68874c18cd9183c6b827

    • SSDEEP

      24576:0yDzwZeLVPuwArniB0XQBcQkvnQ3jKUrN3pKANntmOFlk4exGV:DDzksVWwqtNQ3jKWgAR1FJc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks