General

  • Target

    35b33acf6019c54c699cfeb5a31660bdce2a2c813679a13eeb0d65cb4e9bf63d

  • Size

    643KB

  • Sample

    241110-apr4msvgqp

  • MD5

    0cd205c22ceeb499d6a80dbe621a90da

  • SHA1

    9ff42c7d0e9fe4b98e88123a36dcf832c34f6b08

  • SHA256

    35b33acf6019c54c699cfeb5a31660bdce2a2c813679a13eeb0d65cb4e9bf63d

  • SHA512

    40fbf6a5073e2ccd1a2584dbf1d3b1149604bba2bf888e13f2104900b9fb5759eebf179d27f908a0cbe6d5f5bd8c688341dc002ad347f9e54035090df2fd69be

  • SSDEEP

    12288:AMrvy90Qiri2bHdgjm3LWGY95RaKecU+JVCycDVL20Jnohu:fyBqiKdHbWG8TaKecUgxsVLdNEu

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      35b33acf6019c54c699cfeb5a31660bdce2a2c813679a13eeb0d65cb4e9bf63d

    • Size

      643KB

    • MD5

      0cd205c22ceeb499d6a80dbe621a90da

    • SHA1

      9ff42c7d0e9fe4b98e88123a36dcf832c34f6b08

    • SHA256

      35b33acf6019c54c699cfeb5a31660bdce2a2c813679a13eeb0d65cb4e9bf63d

    • SHA512

      40fbf6a5073e2ccd1a2584dbf1d3b1149604bba2bf888e13f2104900b9fb5759eebf179d27f908a0cbe6d5f5bd8c688341dc002ad347f9e54035090df2fd69be

    • SSDEEP

      12288:AMrvy90Qiri2bHdgjm3LWGY95RaKecU+JVCycDVL20Jnohu:fyBqiKdHbWG8TaKecUgxsVLdNEu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks