General

  • Target

    9d21e9cba5858a4d47d2c2ed82f6cbdd54d5848825904d0d187260c04a19964c

  • Size

    568KB

  • Sample

    241110-r16vlsydrp

  • MD5

    e28b3855fb9b4ab1b4c9550b0f32332b

  • SHA1

    03997e958f9b1e6b20ef69fe3023398514ef70b5

  • SHA256

    9d21e9cba5858a4d47d2c2ed82f6cbdd54d5848825904d0d187260c04a19964c

  • SHA512

    8240e8b882553348df0177a8586673a06cb0ed9386d6e3763c1b63ee76fc808bc56262d459e07a3707d162471741a87d24b051604752d8801af5d9050bb95e83

  • SSDEEP

    12288:NMrky90HBifTiNdAf46BqoROKSEHl9D7b4m7Ywdkk8c:ByMc7iYfXOfEHl9N7ec

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      9d21e9cba5858a4d47d2c2ed82f6cbdd54d5848825904d0d187260c04a19964c

    • Size

      568KB

    • MD5

      e28b3855fb9b4ab1b4c9550b0f32332b

    • SHA1

      03997e958f9b1e6b20ef69fe3023398514ef70b5

    • SHA256

      9d21e9cba5858a4d47d2c2ed82f6cbdd54d5848825904d0d187260c04a19964c

    • SHA512

      8240e8b882553348df0177a8586673a06cb0ed9386d6e3763c1b63ee76fc808bc56262d459e07a3707d162471741a87d24b051604752d8801af5d9050bb95e83

    • SSDEEP

      12288:NMrky90HBifTiNdAf46BqoROKSEHl9D7b4m7Ywdkk8c:ByMc7iYfXOfEHl9N7ec

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks