General

  • Target

    ec278130c39d3a445edbcfd08c9ddf16066d9730fb4a345a2324e0a5ef5a111b

  • Size

    567KB

  • Sample

    241110-pzbxqswngy

  • MD5

    79b95c3dc7907f91498bfed1438a5d89

  • SHA1

    da5ee81e79aadb85d137ed5421a8b59a0aabf331

  • SHA256

    ec278130c39d3a445edbcfd08c9ddf16066d9730fb4a345a2324e0a5ef5a111b

  • SHA512

    8cfae816412b48e7692da3bd6ee52b03a125bcf02988638632fbb900393ebb1522ef1303e03e71f79dcff1035a33e38a03a0c1c5aa5dbd41ef5746c402a78632

  • SSDEEP

    12288:gMrVy90nMY+1bK8SCmN4vXCTKAYTxwOQhGPg00JfG:FyPYaFfmN3CTGOCjfG

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      ec278130c39d3a445edbcfd08c9ddf16066d9730fb4a345a2324e0a5ef5a111b

    • Size

      567KB

    • MD5

      79b95c3dc7907f91498bfed1438a5d89

    • SHA1

      da5ee81e79aadb85d137ed5421a8b59a0aabf331

    • SHA256

      ec278130c39d3a445edbcfd08c9ddf16066d9730fb4a345a2324e0a5ef5a111b

    • SHA512

      8cfae816412b48e7692da3bd6ee52b03a125bcf02988638632fbb900393ebb1522ef1303e03e71f79dcff1035a33e38a03a0c1c5aa5dbd41ef5746c402a78632

    • SSDEEP

      12288:gMrVy90nMY+1bK8SCmN4vXCTKAYTxwOQhGPg00JfG:FyPYaFfmN3CTGOCjfG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks