General

  • Target

    31666fab71826d62a76ae17d75733ee344983301140c4d2b03548f793c84a762

  • Size

    554KB

  • Sample

    241110-qlsh1awrgw

  • MD5

    5cf2e01a8059d747efe10222fd9327bb

  • SHA1

    3d509cf5c8cfc7ac8eb7b36124b09cac38f546bd

  • SHA256

    31666fab71826d62a76ae17d75733ee344983301140c4d2b03548f793c84a762

  • SHA512

    000825e4cfeb413c9c2c09a603b29164d0c0e012f8721d47f09acae0f8740ce8cb3170a11dfbb9f6c8472b608368eb4d4340c4edbf562ffa6ade3ff5a2d7ec34

  • SSDEEP

    12288:GMrgy90Ugzr6ZH5goaOPOQX5XIotPh0/irN2GmbOxTP53:KyqK52WXFIophuu

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      31666fab71826d62a76ae17d75733ee344983301140c4d2b03548f793c84a762

    • Size

      554KB

    • MD5

      5cf2e01a8059d747efe10222fd9327bb

    • SHA1

      3d509cf5c8cfc7ac8eb7b36124b09cac38f546bd

    • SHA256

      31666fab71826d62a76ae17d75733ee344983301140c4d2b03548f793c84a762

    • SHA512

      000825e4cfeb413c9c2c09a603b29164d0c0e012f8721d47f09acae0f8740ce8cb3170a11dfbb9f6c8472b608368eb4d4340c4edbf562ffa6ade3ff5a2d7ec34

    • SSDEEP

      12288:GMrgy90Ugzr6ZH5goaOPOQX5XIotPh0/irN2GmbOxTP53:KyqK52WXFIophuu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks