General

  • Target

    3460b6baf6477c9be992453b6b93a752b2e30f7b56993a5af78cd4365247c309

  • Size

    479KB

  • Sample

    241110-nspdtaweqf

  • MD5

    756b097d04f94893507fcaa184269744

  • SHA1

    0308c72ab64003906b66e3573a282a0060e7ec79

  • SHA256

    3460b6baf6477c9be992453b6b93a752b2e30f7b56993a5af78cd4365247c309

  • SHA512

    c8372124a927998c78bd3fbeb1a915d668e12f2055e0017bd2da236eed6cd12dca20ba5041707dc3ff3606e3e1f4dbd98413285c8976c46bac3a26cde4696ca8

  • SSDEEP

    6144:KIy+bnr++p0yN90QErNIl2m+CSPZ/EqIGb3F1eHXKGCnifmXHgsSqtx:wMriy90l6l2dETGbbEXKGCiOXqOx

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      3460b6baf6477c9be992453b6b93a752b2e30f7b56993a5af78cd4365247c309

    • Size

      479KB

    • MD5

      756b097d04f94893507fcaa184269744

    • SHA1

      0308c72ab64003906b66e3573a282a0060e7ec79

    • SHA256

      3460b6baf6477c9be992453b6b93a752b2e30f7b56993a5af78cd4365247c309

    • SHA512

      c8372124a927998c78bd3fbeb1a915d668e12f2055e0017bd2da236eed6cd12dca20ba5041707dc3ff3606e3e1f4dbd98413285c8976c46bac3a26cde4696ca8

    • SSDEEP

      6144:KIy+bnr++p0yN90QErNIl2m+CSPZ/EqIGb3F1eHXKGCnifmXHgsSqtx:wMriy90l6l2dETGbbEXKGCiOXqOx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks