General

  • Target

    39f557b2cb8efc0f80d31f46eb6d54e1bce78d3fcdf6084d0f22199734fe397b

  • Size

    1.5MB

  • Sample

    241110-3v1xysxkgx

  • MD5

    0d689bc34245551839c5e4a5d033df52

  • SHA1

    189e445a3df78510fa96695378f78a650f41ee9d

  • SHA256

    39f557b2cb8efc0f80d31f46eb6d54e1bce78d3fcdf6084d0f22199734fe397b

  • SHA512

    4b0dc12033c9d81c0fb90effe380c0f95015217fe4f5ed6b5b3399228afa554eafab8aa9648f4663a33174b90d6dcb60c8153103f1b892e6b222bd02cafa8c61

  • SSDEEP

    24576:QyBnum8fZ8oyHk5uB5ks6lij8m5TFz2q+SZ/iJS2cOZ+V+XlAyG+HXIYfAt:XBn+uBkYr6Mj8gx9vKw2Zdb3IoA

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Targets

    • Target

      39f557b2cb8efc0f80d31f46eb6d54e1bce78d3fcdf6084d0f22199734fe397b

    • Size

      1.5MB

    • MD5

      0d689bc34245551839c5e4a5d033df52

    • SHA1

      189e445a3df78510fa96695378f78a650f41ee9d

    • SHA256

      39f557b2cb8efc0f80d31f46eb6d54e1bce78d3fcdf6084d0f22199734fe397b

    • SHA512

      4b0dc12033c9d81c0fb90effe380c0f95015217fe4f5ed6b5b3399228afa554eafab8aa9648f4663a33174b90d6dcb60c8153103f1b892e6b222bd02cafa8c61

    • SSDEEP

      24576:QyBnum8fZ8oyHk5uB5ks6lij8m5TFz2q+SZ/iJS2cOZ+V+XlAyG+HXIYfAt:XBn+uBkYr6Mj8gx9vKw2Zdb3IoA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks