General

  • Target

    b851952b7e34cd033142d668231352e0116952f763352339236748b458e77672

  • Size

    643KB

  • Sample

    241110-b4pshazkep

  • MD5

    c9a4d7a9815d41d02648ed4031d99d6c

  • SHA1

    718e620a6166f5d7e317a982268d348e3892c288

  • SHA256

    b851952b7e34cd033142d668231352e0116952f763352339236748b458e77672

  • SHA512

    5c2110f7360e9b70aec639c5b159581625b071cb69beaa68e0e4665c85999e309276509df3cf34452f6e3f9a8594a06ba344a54597234276c128d0d11c006c10

  • SSDEEP

    12288:vMr/y90Px5kMGdLwX29iQApkc5RaiAd1/UH39oDWEgzjwHoC:kyMk/uG9+JTaiAdmmzg/wR

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      b851952b7e34cd033142d668231352e0116952f763352339236748b458e77672

    • Size

      643KB

    • MD5

      c9a4d7a9815d41d02648ed4031d99d6c

    • SHA1

      718e620a6166f5d7e317a982268d348e3892c288

    • SHA256

      b851952b7e34cd033142d668231352e0116952f763352339236748b458e77672

    • SHA512

      5c2110f7360e9b70aec639c5b159581625b071cb69beaa68e0e4665c85999e309276509df3cf34452f6e3f9a8594a06ba344a54597234276c128d0d11c006c10

    • SSDEEP

      12288:vMr/y90Px5kMGdLwX29iQApkc5RaiAd1/UH39oDWEgzjwHoC:kyMk/uG9+JTaiAdmmzg/wR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks