General

  • Target

    ae76662153bba4cb57d4534940fa7daaf6899b140264e5316370d4cdd09b782f

  • Size

    643KB

  • Sample

    241110-bwhzzsyrhl

  • MD5

    37ca7a92b55cc2843e8e827fe5533f36

  • SHA1

    a70ae62262c3f86102bde4aa32fb117fa4265f9f

  • SHA256

    ae76662153bba4cb57d4534940fa7daaf6899b140264e5316370d4cdd09b782f

  • SHA512

    b481efa1afddd16b9d19dc6b3d0b0deb42545c3833c1be0995cb475ccaff0c4a492832fca39b5769c4528654a4d0e29aff6727d17906f267de16f5bf7fc26d86

  • SSDEEP

    12288:SMr3y90WyExqfVjKGAyZyhVzgO67q9bO3XRoDFsQgu4pxhNrsLC7n:1yzqfSy6xgt7myyRL4pxzOGn

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      ae76662153bba4cb57d4534940fa7daaf6899b140264e5316370d4cdd09b782f

    • Size

      643KB

    • MD5

      37ca7a92b55cc2843e8e827fe5533f36

    • SHA1

      a70ae62262c3f86102bde4aa32fb117fa4265f9f

    • SHA256

      ae76662153bba4cb57d4534940fa7daaf6899b140264e5316370d4cdd09b782f

    • SHA512

      b481efa1afddd16b9d19dc6b3d0b0deb42545c3833c1be0995cb475ccaff0c4a492832fca39b5769c4528654a4d0e29aff6727d17906f267de16f5bf7fc26d86

    • SSDEEP

      12288:SMr3y90WyExqfVjKGAyZyhVzgO67q9bO3XRoDFsQgu4pxhNrsLC7n:1yzqfSy6xgt7myyRL4pxzOGn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks