General

  • Target

    d4835d490aa3cca5fb1082484d75b0de9f3942649ab9425ee65c52bd9c7b8cf0

  • Size

    480KB

  • Sample

    241110-rshg2syerd

  • MD5

    3635aa60d4681e9b6d954d50e7748506

  • SHA1

    0d4dfd19fcfa800bffccc7a64739b4383f2d012d

  • SHA256

    d4835d490aa3cca5fb1082484d75b0de9f3942649ab9425ee65c52bd9c7b8cf0

  • SHA512

    e7964a07acba9ee0a46a8eb2a1199b5975b5424e3bb2555872f921f64b66cadd4c62eb2e5dc2a087b894ae4218c5a0444d955bd1bd5515e72d654e415ee9673b

  • SSDEEP

    12288:gMr6y90v8SFwj5VY6PoK65t1RffQ3JC9eEr:qyj6wVWg65NA3JCU6

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      d4835d490aa3cca5fb1082484d75b0de9f3942649ab9425ee65c52bd9c7b8cf0

    • Size

      480KB

    • MD5

      3635aa60d4681e9b6d954d50e7748506

    • SHA1

      0d4dfd19fcfa800bffccc7a64739b4383f2d012d

    • SHA256

      d4835d490aa3cca5fb1082484d75b0de9f3942649ab9425ee65c52bd9c7b8cf0

    • SHA512

      e7964a07acba9ee0a46a8eb2a1199b5975b5424e3bb2555872f921f64b66cadd4c62eb2e5dc2a087b894ae4218c5a0444d955bd1bd5515e72d654e415ee9673b

    • SSDEEP

      12288:gMr6y90v8SFwj5VY6PoK65t1RffQ3JC9eEr:qyj6wVWg65NA3JCU6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks