General

  • Target

    de611fb0fd14adeff9ba768278bf95ba439ba644e5c630b621e2b6111d6963aa

  • Size

    479KB

  • Sample

    241110-m2ys6sylem

  • MD5

    5b6deb42600590edf9a9cd8da9bc5a96

  • SHA1

    c717b55950dff70c95ea862e87273fd64f153e7e

  • SHA256

    de611fb0fd14adeff9ba768278bf95ba439ba644e5c630b621e2b6111d6963aa

  • SHA512

    380fc12c3184c5f17ef5a21276e6b97c5ff09c3e78f5d7b04cdc57456928c877559dd3bf7c407ab189d9ef218cc63cf09b6275cbb3071e74e80de972728b1d40

  • SSDEEP

    12288:wMrsy909qePvdGLlJJs13zXzeI5/1Zt24JXcICN3Ls+wys:MySP1klEqInZoIUs+wys

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      de611fb0fd14adeff9ba768278bf95ba439ba644e5c630b621e2b6111d6963aa

    • Size

      479KB

    • MD5

      5b6deb42600590edf9a9cd8da9bc5a96

    • SHA1

      c717b55950dff70c95ea862e87273fd64f153e7e

    • SHA256

      de611fb0fd14adeff9ba768278bf95ba439ba644e5c630b621e2b6111d6963aa

    • SHA512

      380fc12c3184c5f17ef5a21276e6b97c5ff09c3e78f5d7b04cdc57456928c877559dd3bf7c407ab189d9ef218cc63cf09b6275cbb3071e74e80de972728b1d40

    • SSDEEP

      12288:wMrsy909qePvdGLlJJs13zXzeI5/1Zt24JXcICN3Ls+wys:MySP1klEqInZoIUs+wys

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks