General

  • Target

    be4280e1bc9db2c54045ca5f2d8a126483ba1d509ffad51aa25cba9a751c4834

  • Size

    568KB

  • Sample

    241110-e5fsrsspgl

  • MD5

    fffc3cf7e9ff7b8d465a484c4cbbe7c1

  • SHA1

    d79a32b5e9e9a18ec9578ccb52bbc4a7ea8a9c72

  • SHA256

    be4280e1bc9db2c54045ca5f2d8a126483ba1d509ffad51aa25cba9a751c4834

  • SHA512

    92277b99ea18fcb14e69e3bb18b9d3b93c42eccede1eb9c53537d14b4630f189953467a74dd6707b48be41bccf0621d88df5405fc2e12b6c2aa0cbd187c37d8d

  • SSDEEP

    12288:zMrRy9064Ak+0sYg3ZfXNacEFnhe4tknXETsW:SyF4h+RtJfdeBw4X

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      be4280e1bc9db2c54045ca5f2d8a126483ba1d509ffad51aa25cba9a751c4834

    • Size

      568KB

    • MD5

      fffc3cf7e9ff7b8d465a484c4cbbe7c1

    • SHA1

      d79a32b5e9e9a18ec9578ccb52bbc4a7ea8a9c72

    • SHA256

      be4280e1bc9db2c54045ca5f2d8a126483ba1d509ffad51aa25cba9a751c4834

    • SHA512

      92277b99ea18fcb14e69e3bb18b9d3b93c42eccede1eb9c53537d14b4630f189953467a74dd6707b48be41bccf0621d88df5405fc2e12b6c2aa0cbd187c37d8d

    • SSDEEP

      12288:zMrRy9064Ak+0sYg3ZfXNacEFnhe4tknXETsW:SyF4h+RtJfdeBw4X

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks