General

  • Target

    2e1caa6895f5837927090af097770f5f35e81037551f99bab40cba77f9857c30

  • Size

    643KB

  • Sample

    241110-mjmcesvdlp

  • MD5

    8d9014b760f9b80923415bcc1b8058ef

  • SHA1

    eacf80c1e262ba9abb209069da6cb1ac4c3bd3e9

  • SHA256

    2e1caa6895f5837927090af097770f5f35e81037551f99bab40cba77f9857c30

  • SHA512

    3ba3107a13a0cfddb27c062bba4bf38cf671b6354b46fb00adc9846babc7d5c41b1c296aef51a46189cd0bf54a627ab8a716d51c9941ce8f4344b99e3a969296

  • SSDEEP

    12288:7MrHy90AirFG03tyLG8Hig9fBJndOlXQhwUVG4BGw8JvicCGuXmuLlGV1:YytY8PG0iWfBJndOFQhwU1BGLAJ1Xmu

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      2e1caa6895f5837927090af097770f5f35e81037551f99bab40cba77f9857c30

    • Size

      643KB

    • MD5

      8d9014b760f9b80923415bcc1b8058ef

    • SHA1

      eacf80c1e262ba9abb209069da6cb1ac4c3bd3e9

    • SHA256

      2e1caa6895f5837927090af097770f5f35e81037551f99bab40cba77f9857c30

    • SHA512

      3ba3107a13a0cfddb27c062bba4bf38cf671b6354b46fb00adc9846babc7d5c41b1c296aef51a46189cd0bf54a627ab8a716d51c9941ce8f4344b99e3a969296

    • SSDEEP

      12288:7MrHy90AirFG03tyLG8Hig9fBJndOlXQhwUVG4BGw8JvicCGuXmuLlGV1:YytY8PG0iWfBJndOFQhwU1BGLAJ1Xmu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks