General

  • Target

    0c347927f111206e6215201d7ca802276adf2c6050ad5c3784d8d1b1479a1053

  • Size

    479KB

  • Sample

    241110-3l9thazrhp

  • MD5

    c05e17d3b9ae9366fc220948aee6337e

  • SHA1

    52d5c774b6372e0d100d49416cc93a504c45923f

  • SHA256

    0c347927f111206e6215201d7ca802276adf2c6050ad5c3784d8d1b1479a1053

  • SHA512

    20f920cf7f9975939fe1474a1bd9eab2506be50f8ffd09d41ac27ba76c268c2923b65bc42d2118904d9a2fd46ad4e388e723f43f271b2339f247d3bd546d9b2e

  • SSDEEP

    12288:GMrky90gtvPw+WUt/KQtulymSdo02jekYZBZ2dKAaNk:myLvP3lK/wNozKXAkk

Malware Config

Extracted

Family

redline

Botnet

dippo

C2

217.196.96.102:4132

Attributes
  • auth_value

    79490ff628fd6af3b29170c3c163874b

Targets

    • Target

      0c347927f111206e6215201d7ca802276adf2c6050ad5c3784d8d1b1479a1053

    • Size

      479KB

    • MD5

      c05e17d3b9ae9366fc220948aee6337e

    • SHA1

      52d5c774b6372e0d100d49416cc93a504c45923f

    • SHA256

      0c347927f111206e6215201d7ca802276adf2c6050ad5c3784d8d1b1479a1053

    • SHA512

      20f920cf7f9975939fe1474a1bd9eab2506be50f8ffd09d41ac27ba76c268c2923b65bc42d2118904d9a2fd46ad4e388e723f43f271b2339f247d3bd546d9b2e

    • SSDEEP

      12288:GMrky90gtvPw+WUt/KQtulymSdo02jekYZBZ2dKAaNk:myLvP3lK/wNozKXAkk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks