General

  • Target

    3b8321c3477fcb3f52379d195bd952215604068f533496d9afac6f77f59f43ab

  • Size

    567KB

  • Sample

    241110-er9hxszcmf

  • MD5

    e2de493e2cdc42d340d98676a9c335d6

  • SHA1

    3cfef1e158c10e13b24d173b36376b25ece3d389

  • SHA256

    3b8321c3477fcb3f52379d195bd952215604068f533496d9afac6f77f59f43ab

  • SHA512

    eccfc22a2ff02d07fbe9aebb5d239561b3e5e32ca5863744bcab0d8d2945a220cca2a20e009f3a2d51e99af926d74f026dade230bf973f0b0def6523faf64c85

  • SSDEEP

    12288:IMrWy90R2aRlnmxACMrByE+SBpts1Zl0ne7oi2WyfKdMGRS:eyW2qlnmxqT+LkVpKM4S

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      3b8321c3477fcb3f52379d195bd952215604068f533496d9afac6f77f59f43ab

    • Size

      567KB

    • MD5

      e2de493e2cdc42d340d98676a9c335d6

    • SHA1

      3cfef1e158c10e13b24d173b36376b25ece3d389

    • SHA256

      3b8321c3477fcb3f52379d195bd952215604068f533496d9afac6f77f59f43ab

    • SHA512

      eccfc22a2ff02d07fbe9aebb5d239561b3e5e32ca5863744bcab0d8d2945a220cca2a20e009f3a2d51e99af926d74f026dade230bf973f0b0def6523faf64c85

    • SSDEEP

      12288:IMrWy90R2aRlnmxACMrByE+SBpts1Zl0ne7oi2WyfKdMGRS:eyW2qlnmxqT+LkVpKM4S

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks