General

  • Target

    feafdf2f1410aef56fda21a2cbcaa24e3ff70a7de175b94598bfa4658d8a3159

  • Size

    568KB

  • Sample

    241110-efkenaygmp

  • MD5

    124972f9f61c4d7735202d93127d2844

  • SHA1

    3be5f83439a2ec8f3d5fa9a414afcde2488f9a3d

  • SHA256

    feafdf2f1410aef56fda21a2cbcaa24e3ff70a7de175b94598bfa4658d8a3159

  • SHA512

    c600abc4a7b63be087323e4cfcdbe1340860eec42d8ea9cf134f6785a5b781ccf80202f75ee9727cd0b1ceb5392ea2a6eefd9ec0c0f8c161280bec7855fd8cdf

  • SSDEEP

    12288:3MrBy90quA4aTIK8Mt4JPhYbedcu2k/gGf986Ms473P8m:qyvuPGL8BV2mcuBvi6d47j

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      feafdf2f1410aef56fda21a2cbcaa24e3ff70a7de175b94598bfa4658d8a3159

    • Size

      568KB

    • MD5

      124972f9f61c4d7735202d93127d2844

    • SHA1

      3be5f83439a2ec8f3d5fa9a414afcde2488f9a3d

    • SHA256

      feafdf2f1410aef56fda21a2cbcaa24e3ff70a7de175b94598bfa4658d8a3159

    • SHA512

      c600abc4a7b63be087323e4cfcdbe1340860eec42d8ea9cf134f6785a5b781ccf80202f75ee9727cd0b1ceb5392ea2a6eefd9ec0c0f8c161280bec7855fd8cdf

    • SSDEEP

      12288:3MrBy90quA4aTIK8Mt4JPhYbedcu2k/gGf986Ms473P8m:qyvuPGL8BV2mcuBvi6d47j

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks