General

  • Target

    795b7ab1ad5e4cf80c1adbe3d88acfacfbd6e27ac41dcc28ea6baf7b7d72d951

  • Size

    643KB

  • Sample

    241110-f1s3zatlar

  • MD5

    fc4291ed81f8ad2adcb89d82f19255d7

  • SHA1

    9f550d184efa8617cd66d54bc169a84df0a86136

  • SHA256

    795b7ab1ad5e4cf80c1adbe3d88acfacfbd6e27ac41dcc28ea6baf7b7d72d951

  • SHA512

    244118be211ca9f48104b917f2909366a67eb209be157ac5577aa0c4344df5e5bca669d43f99a6e9adb642cda1cfcea255b0418c33e1158274f415bedd5a9e34

  • SSDEEP

    12288:uMryy90vagMPPaVhY1ZR8eBdDJoRhuypxhNjvOW324Mq+:MyMMPUcP8uBJoRcypxzjH3LMq+

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      795b7ab1ad5e4cf80c1adbe3d88acfacfbd6e27ac41dcc28ea6baf7b7d72d951

    • Size

      643KB

    • MD5

      fc4291ed81f8ad2adcb89d82f19255d7

    • SHA1

      9f550d184efa8617cd66d54bc169a84df0a86136

    • SHA256

      795b7ab1ad5e4cf80c1adbe3d88acfacfbd6e27ac41dcc28ea6baf7b7d72d951

    • SHA512

      244118be211ca9f48104b917f2909366a67eb209be157ac5577aa0c4344df5e5bca669d43f99a6e9adb642cda1cfcea255b0418c33e1158274f415bedd5a9e34

    • SSDEEP

      12288:uMryy90vagMPPaVhY1ZR8eBdDJoRhuypxhNjvOW324Mq+:MyMMPUcP8uBJoRcypxzjH3LMq+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks