General

  • Target

    2ca1cc33308c5659d242382bbbaefaa2fbe79a94280a433960fd80a749294e5c

  • Size

    567KB

  • Sample

    241110-q7da7sxhmn

  • MD5

    dd76f10ea56a61daf4771201f0c7d404

  • SHA1

    ff47594cb73469c2e3729ebb17060fa23d334c2a

  • SHA256

    2ca1cc33308c5659d242382bbbaefaa2fbe79a94280a433960fd80a749294e5c

  • SHA512

    9744884d77e28033d9dd1f09d07cfb2f5d621fff7ad9641f279b587265e01607d5a9e972fcbc79c88ca5515c2f34c0475a6ccba22123e71e697c324423ba281b

  • SSDEEP

    12288:BMrxy90Hn3i0kdIzZG0XHR+hjTSj6WGoSh6lMJwnUnjq:8yMRkudfHR6jTS+BMGCnUnjq

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      2ca1cc33308c5659d242382bbbaefaa2fbe79a94280a433960fd80a749294e5c

    • Size

      567KB

    • MD5

      dd76f10ea56a61daf4771201f0c7d404

    • SHA1

      ff47594cb73469c2e3729ebb17060fa23d334c2a

    • SHA256

      2ca1cc33308c5659d242382bbbaefaa2fbe79a94280a433960fd80a749294e5c

    • SHA512

      9744884d77e28033d9dd1f09d07cfb2f5d621fff7ad9641f279b587265e01607d5a9e972fcbc79c88ca5515c2f34c0475a6ccba22123e71e697c324423ba281b

    • SSDEEP

      12288:BMrxy90Hn3i0kdIzZG0XHR+hjTSj6WGoSh6lMJwnUnjq:8yMRkudfHR6jTS+BMGCnUnjq

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks