General

  • Target

    6bdc304f6dbd8badb29e4470519fb2b82292a914ea456b8084dc49437a250699

  • Size

    642KB

  • Sample

    241110-gmj4kstqcp

  • MD5

    931ced37f5592da18d4638179cd83b03

  • SHA1

    26f80f9ec71df5cb4c300e5287eb4da1e15458dd

  • SHA256

    6bdc304f6dbd8badb29e4470519fb2b82292a914ea456b8084dc49437a250699

  • SHA512

    84a3d28fc015ef89e382f9d4ef4975710705040256f31243989e6984d708ee21321784ea0b9f1d34ccb5eb7f5a5623bc2a103b6fc3e4cfa36a2d5b102f79f335

  • SSDEEP

    12288:hMrWy90WC4+JqlctSP04v2AjtWlzq8EsCzZkdPTmCU05:Dyg4/ctSP0GIPaZwTmc

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      6bdc304f6dbd8badb29e4470519fb2b82292a914ea456b8084dc49437a250699

    • Size

      642KB

    • MD5

      931ced37f5592da18d4638179cd83b03

    • SHA1

      26f80f9ec71df5cb4c300e5287eb4da1e15458dd

    • SHA256

      6bdc304f6dbd8badb29e4470519fb2b82292a914ea456b8084dc49437a250699

    • SHA512

      84a3d28fc015ef89e382f9d4ef4975710705040256f31243989e6984d708ee21321784ea0b9f1d34ccb5eb7f5a5623bc2a103b6fc3e4cfa36a2d5b102f79f335

    • SSDEEP

      12288:hMrWy90WC4+JqlctSP04v2AjtWlzq8EsCzZkdPTmCU05:Dyg4/ctSP0GIPaZwTmc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks