General

  • Target

    048a69dec5fda624e706c314f7ebea81a1bc0c04abcf15985242651b86bafe5eN

  • Size

    307KB

  • Sample

    241110-s6cpdssrak

  • MD5

    92ea2b092d2b8b22c59b1e0f652b0990

  • SHA1

    2a6cd2f7b588d5eedf6d79afb0426b32c5ea2bf6

  • SHA256

    048a69dec5fda624e706c314f7ebea81a1bc0c04abcf15985242651b86bafe5e

  • SHA512

    d44052b0aa40a7f4a86f42fdf556c28bc2b2da384c5452f4f51d13354a166c3cbb49f8ab19c5dd37ecc3e603d316e233c158167a99398f043b1b0a463a301433

  • SSDEEP

    6144:Khy+bnr+op0yN90QENUHh4HZn7EGgkLufTBn95DT17:nMrUy90YH0gtoufTN9/

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      048a69dec5fda624e706c314f7ebea81a1bc0c04abcf15985242651b86bafe5eN

    • Size

      307KB

    • MD5

      92ea2b092d2b8b22c59b1e0f652b0990

    • SHA1

      2a6cd2f7b588d5eedf6d79afb0426b32c5ea2bf6

    • SHA256

      048a69dec5fda624e706c314f7ebea81a1bc0c04abcf15985242651b86bafe5e

    • SHA512

      d44052b0aa40a7f4a86f42fdf556c28bc2b2da384c5452f4f51d13354a166c3cbb49f8ab19c5dd37ecc3e603d316e233c158167a99398f043b1b0a463a301433

    • SSDEEP

      6144:Khy+bnr+op0yN90QENUHh4HZn7EGgkLufTBn95DT17:nMrUy90YH0gtoufTN9/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks