General

  • Target

    db619a00a9bf6e3bef853c2f24781bf8273bf3adc7288172715be593cf74168f

  • Size

    643KB

  • Sample

    241110-mzxhbswapb

  • MD5

    f44120ac8404245400a2086bd640f976

  • SHA1

    a875d4d3aa2d3af0cdc66e697e6003d836fbfa22

  • SHA256

    db619a00a9bf6e3bef853c2f24781bf8273bf3adc7288172715be593cf74168f

  • SHA512

    0d2eb7cc050f0b15e71509d9b0e38d7b51ea14339ae371c030783b0c9d22a9f0353b8cd7e70d662e22c883ace643f9df49958e544fe19104dec318d52f493aa7

  • SSDEEP

    12288:6Mr9y90+qb2FxjcBTNSUYzrvFR7wA04qWnOhb3Y5sZ0guu3pxhN/KfPO2x:vy22FKJN5YzrtRsRynt40m3pxz/KX5

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      db619a00a9bf6e3bef853c2f24781bf8273bf3adc7288172715be593cf74168f

    • Size

      643KB

    • MD5

      f44120ac8404245400a2086bd640f976

    • SHA1

      a875d4d3aa2d3af0cdc66e697e6003d836fbfa22

    • SHA256

      db619a00a9bf6e3bef853c2f24781bf8273bf3adc7288172715be593cf74168f

    • SHA512

      0d2eb7cc050f0b15e71509d9b0e38d7b51ea14339ae371c030783b0c9d22a9f0353b8cd7e70d662e22c883ace643f9df49958e544fe19104dec318d52f493aa7

    • SSDEEP

      12288:6Mr9y90+qb2FxjcBTNSUYzrvFR7wA04qWnOhb3Y5sZ0guu3pxhN/KfPO2x:vy22FKJN5YzrtRsRynt40m3pxz/KX5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks