General

  • Target

    7135d1383c6c3b928dffb0f21e1a0a7db275809f3cd64739e724c4b7aac5e90b

  • Size

    554KB

  • Sample

    241110-k1anvatdqp

  • MD5

    2e0f454388f98cd6ba7a3a3edc9aa8be

  • SHA1

    ca53441e1115b3e83cd7879782852807f761c4f2

  • SHA256

    7135d1383c6c3b928dffb0f21e1a0a7db275809f3cd64739e724c4b7aac5e90b

  • SHA512

    1abc4c8c2aff5117dc69828dd82ef21933dd6b56229862c5bfcd1234b5edd57564b335306099105186082c55e57532a67c9a8775dc3cffba9a98c9b919f021ec

  • SSDEEP

    12288:2Mrky90XfC9c3GHTgjMG5EVxofK3aAwu38K:OyKfCnT4y13ay38K

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      7135d1383c6c3b928dffb0f21e1a0a7db275809f3cd64739e724c4b7aac5e90b

    • Size

      554KB

    • MD5

      2e0f454388f98cd6ba7a3a3edc9aa8be

    • SHA1

      ca53441e1115b3e83cd7879782852807f761c4f2

    • SHA256

      7135d1383c6c3b928dffb0f21e1a0a7db275809f3cd64739e724c4b7aac5e90b

    • SHA512

      1abc4c8c2aff5117dc69828dd82ef21933dd6b56229862c5bfcd1234b5edd57564b335306099105186082c55e57532a67c9a8775dc3cffba9a98c9b919f021ec

    • SSDEEP

      12288:2Mrky90XfC9c3GHTgjMG5EVxofK3aAwu38K:OyKfCnT4y13ay38K

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks