General

  • Target

    4f46e4073a334880d44046a0de60a425a58a0f97f66d71ec2c7f7eb0d066ce7e

  • Size

    1.1MB

  • Sample

    241110-cek9fszmer

  • MD5

    ed86411bead0470c1a02f9764c817c3d

  • SHA1

    30d5e0404f959a589bdd8cb279e4d6a08bb319d3

  • SHA256

    4f46e4073a334880d44046a0de60a425a58a0f97f66d71ec2c7f7eb0d066ce7e

  • SHA512

    fe4c71784944dd45c72788af78a767b4b5d4f8bb3b7b8fcfa2589de29ca1580e94095088a05913f2e83e46c50fd1f509fc25ed37520c295997e4a509dc4be814

  • SSDEEP

    24576:dyo5hG3nov+RSN43eecbfTirocvOK0b9JqCUuif2+XIu:4SG3nsASbecfTuoHJFUui+4I

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      4f46e4073a334880d44046a0de60a425a58a0f97f66d71ec2c7f7eb0d066ce7e

    • Size

      1.1MB

    • MD5

      ed86411bead0470c1a02f9764c817c3d

    • SHA1

      30d5e0404f959a589bdd8cb279e4d6a08bb319d3

    • SHA256

      4f46e4073a334880d44046a0de60a425a58a0f97f66d71ec2c7f7eb0d066ce7e

    • SHA512

      fe4c71784944dd45c72788af78a767b4b5d4f8bb3b7b8fcfa2589de29ca1580e94095088a05913f2e83e46c50fd1f509fc25ed37520c295997e4a509dc4be814

    • SSDEEP

      24576:dyo5hG3nov+RSN43eecbfTirocvOK0b9JqCUuif2+XIu:4SG3nsASbecfTuoHJFUui+4I

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks