General

  • Target

    438641e4e74b542b348ff2fc834a5e76bd612fade56c735e194d33532ccc9d70

  • Size

    567KB

  • Sample

    241110-p5ntgszpdr

  • MD5

    e0999dcc531cfb516f980a487ddb1af1

  • SHA1

    a6de483386fc3ea1290078b8e71a794f1e197c5b

  • SHA256

    438641e4e74b542b348ff2fc834a5e76bd612fade56c735e194d33532ccc9d70

  • SHA512

    b71f42ad22134e40fd451eb17fec28d239c8c8bea875438754645ce8db0522808e2afa252c29c3ec78b265c53e81e58039fd9ab3aa2ec0116f492ca1a09a7aaa

  • SSDEEP

    12288:1Mrly90X9JqejkrzsGnaQnff0Jn687RcBBoqzle+M0rl:0yq2/VnaQ0CBhle+7h

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      438641e4e74b542b348ff2fc834a5e76bd612fade56c735e194d33532ccc9d70

    • Size

      567KB

    • MD5

      e0999dcc531cfb516f980a487ddb1af1

    • SHA1

      a6de483386fc3ea1290078b8e71a794f1e197c5b

    • SHA256

      438641e4e74b542b348ff2fc834a5e76bd612fade56c735e194d33532ccc9d70

    • SHA512

      b71f42ad22134e40fd451eb17fec28d239c8c8bea875438754645ce8db0522808e2afa252c29c3ec78b265c53e81e58039fd9ab3aa2ec0116f492ca1a09a7aaa

    • SSDEEP

      12288:1Mrly90X9JqejkrzsGnaQnff0Jn687RcBBoqzle+M0rl:0yq2/VnaQ0CBhle+7h

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks