General

  • Target

    f6c780adc75536375ae7637169b0c0c3f71ef6e6acbdc3a3a0b00de362137714

  • Size

    642KB

  • Sample

    241110-g7mp7s1kbz

  • MD5

    2f60adf506c995474eca423d1cb4fa44

  • SHA1

    d5fee7b5640fb85743967a48bbb9392956b9f81c

  • SHA256

    f6c780adc75536375ae7637169b0c0c3f71ef6e6acbdc3a3a0b00de362137714

  • SHA512

    27f20daf3606f1f3befaf6fafc5ed4345bcde1f8a05219788b96872b0bf98bf7e02630152d079288ffa567794eb76590c2e7a0f5f67dcceda1b1afd77266b5b2

  • SSDEEP

    12288:eMriy906FiXBPGmb+a6CGiQs9HtDNjt60xYKsDxlklKFl:8yTCJGmaazjHVOYsxlzl

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      f6c780adc75536375ae7637169b0c0c3f71ef6e6acbdc3a3a0b00de362137714

    • Size

      642KB

    • MD5

      2f60adf506c995474eca423d1cb4fa44

    • SHA1

      d5fee7b5640fb85743967a48bbb9392956b9f81c

    • SHA256

      f6c780adc75536375ae7637169b0c0c3f71ef6e6acbdc3a3a0b00de362137714

    • SHA512

      27f20daf3606f1f3befaf6fafc5ed4345bcde1f8a05219788b96872b0bf98bf7e02630152d079288ffa567794eb76590c2e7a0f5f67dcceda1b1afd77266b5b2

    • SSDEEP

      12288:eMriy906FiXBPGmb+a6CGiQs9HtDNjt60xYKsDxlklKFl:8yTCJGmaazjHVOYsxlzl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks