General

  • Target

    3b6f93a85fa42b6a5dadf1cea4a4935edf1d158b9776030253b0b2f85c074ca5

  • Size

    567KB

  • Sample

    241110-kqfr4stelb

  • MD5

    aae1ad883c1daa0012704108bb3a973c

  • SHA1

    bedbe912ccd2f17fe5cf1a9e6cbfeac3cbe9fcaf

  • SHA256

    3b6f93a85fa42b6a5dadf1cea4a4935edf1d158b9776030253b0b2f85c074ca5

  • SHA512

    ef5d7f73fa0dc38aeec6e9e030bb83a474f4eef84ae983e560b3b815067464f2544d8051ec4b9de1b994d6d05ca82afc6046b99777647f3266b2ba4279a28e82

  • SSDEEP

    12288:EMrCy90w93yeLUtoBMI5jkdCNCxqYTW6NTYx2ilq44VicBS:Oyn93lUtW5jkoYTMx2yp4xk

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      3b6f93a85fa42b6a5dadf1cea4a4935edf1d158b9776030253b0b2f85c074ca5

    • Size

      567KB

    • MD5

      aae1ad883c1daa0012704108bb3a973c

    • SHA1

      bedbe912ccd2f17fe5cf1a9e6cbfeac3cbe9fcaf

    • SHA256

      3b6f93a85fa42b6a5dadf1cea4a4935edf1d158b9776030253b0b2f85c074ca5

    • SHA512

      ef5d7f73fa0dc38aeec6e9e030bb83a474f4eef84ae983e560b3b815067464f2544d8051ec4b9de1b994d6d05ca82afc6046b99777647f3266b2ba4279a28e82

    • SSDEEP

      12288:EMrCy90w93yeLUtoBMI5jkdCNCxqYTW6NTYx2ilq44VicBS:Oyn93lUtW5jkoYTMx2yp4xk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks