General

  • Target

    eb6e484998852eeadcae4d3e4cd13c04bcc2453c8bbe10a381490bcb988e167b

  • Size

    642KB

  • Sample

    241110-e1s8asspal

  • MD5

    a57fa9655036317278484c572409e94d

  • SHA1

    50627a45add7f4a4af8f3cafcc90b8cdf2802ee0

  • SHA256

    eb6e484998852eeadcae4d3e4cd13c04bcc2453c8bbe10a381490bcb988e167b

  • SHA512

    9c3377f4956b04f57c33a2f14307cc9c9fb6916a43045c05a8c71d776ea4728e8f76c404a366b486b4cf185b93372a9da685487686291203225098b5a182352d

  • SSDEEP

    12288:cMrly90gBpidwCdwWBYuwN9HfJJOfDfDbIodisgIeXkOELju4Sj3:JyrpqwQwWOTn7qb9breXkLje

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      eb6e484998852eeadcae4d3e4cd13c04bcc2453c8bbe10a381490bcb988e167b

    • Size

      642KB

    • MD5

      a57fa9655036317278484c572409e94d

    • SHA1

      50627a45add7f4a4af8f3cafcc90b8cdf2802ee0

    • SHA256

      eb6e484998852eeadcae4d3e4cd13c04bcc2453c8bbe10a381490bcb988e167b

    • SHA512

      9c3377f4956b04f57c33a2f14307cc9c9fb6916a43045c05a8c71d776ea4728e8f76c404a366b486b4cf185b93372a9da685487686291203225098b5a182352d

    • SSDEEP

      12288:cMrly90gBpidwCdwWBYuwN9HfJJOfDfDbIodisgIeXkOELju4Sj3:JyrpqwQwWOTn7qb9breXkLje

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks