General

  • Target

    ddd287cb1306522fae88c757401f166ed9b75850a4cf05b3f759ccb121d66fb1

  • Size

    567KB

  • Sample

    241110-g1t6ps1jdt

  • MD5

    1fae1af8eac0df5f8aaf220b812d0933

  • SHA1

    aff9e68930833d647693627029bfb7a6188c2577

  • SHA256

    ddd287cb1306522fae88c757401f166ed9b75850a4cf05b3f759ccb121d66fb1

  • SHA512

    08954efc58eb900b43ef0792bb3b6cc40521a9a4e0875ff566e61eacfa0d209e364bee9cd6c36459f460ab5d4533a7d780746147cb7a43be4c51efa78ffc8211

  • SSDEEP

    12288:0MrQy90uhyLqOXEJMKsvuafWjWtelPQ22CPj5kJFnDBM/7FBc2k+Jr:0y/yPXEJbs4jcpLnnNMgR+Jr

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      ddd287cb1306522fae88c757401f166ed9b75850a4cf05b3f759ccb121d66fb1

    • Size

      567KB

    • MD5

      1fae1af8eac0df5f8aaf220b812d0933

    • SHA1

      aff9e68930833d647693627029bfb7a6188c2577

    • SHA256

      ddd287cb1306522fae88c757401f166ed9b75850a4cf05b3f759ccb121d66fb1

    • SHA512

      08954efc58eb900b43ef0792bb3b6cc40521a9a4e0875ff566e61eacfa0d209e364bee9cd6c36459f460ab5d4533a7d780746147cb7a43be4c51efa78ffc8211

    • SSDEEP

      12288:0MrQy90uhyLqOXEJMKsvuafWjWtelPQ22CPj5kJFnDBM/7FBc2k+Jr:0y/yPXEJbs4jcpLnnNMgR+Jr

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks