General

  • Target

    72e4d5cecbe8985936bf65f12005825229bfb0ff68d6ed2e3fa8a9bcea0da492

  • Size

    642KB

  • Sample

    241110-dhefrayalr

  • MD5

    2468172af731a4376e66af09b93d4599

  • SHA1

    44d273cd751c82ac61409e9e4079a08b837bb840

  • SHA256

    72e4d5cecbe8985936bf65f12005825229bfb0ff68d6ed2e3fa8a9bcea0da492

  • SHA512

    44baa8c6455cc10c3596d6d10d2be2974da1a6bf9175cd9e191de1f5dff1f0b6f61e2309e45bcca68ed8d6f9bfbbbebde4ce04799ab2aaef24900e22dca6b117

  • SSDEEP

    12288:gMrHy90H3z3IUxyH2SqkaakXZsbgKZNy22+XH4ikkI6W:XyATIvBEXsgE8i34i2

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      72e4d5cecbe8985936bf65f12005825229bfb0ff68d6ed2e3fa8a9bcea0da492

    • Size

      642KB

    • MD5

      2468172af731a4376e66af09b93d4599

    • SHA1

      44d273cd751c82ac61409e9e4079a08b837bb840

    • SHA256

      72e4d5cecbe8985936bf65f12005825229bfb0ff68d6ed2e3fa8a9bcea0da492

    • SHA512

      44baa8c6455cc10c3596d6d10d2be2974da1a6bf9175cd9e191de1f5dff1f0b6f61e2309e45bcca68ed8d6f9bfbbbebde4ce04799ab2aaef24900e22dca6b117

    • SSDEEP

      12288:gMrHy90H3z3IUxyH2SqkaakXZsbgKZNy22+XH4ikkI6W:XyATIvBEXsgE8i34i2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks