General

  • Target

    6c4892ecaf3228cf5d44c30d80bb7924c793272b9827c28a9bed12e194434f61

  • Size

    643KB

  • Sample

    241110-swy5msspgk

  • MD5

    fbb197969ab904aeb032c0fe69aaf39b

  • SHA1

    a6818a18c60d034b85906e615cd73ab6a05fa2fa

  • SHA256

    6c4892ecaf3228cf5d44c30d80bb7924c793272b9827c28a9bed12e194434f61

  • SHA512

    27c41dbc30ec7b892674aefb0333b41fc23cdcaa5ca8d46d52c3e65ec5321e3bd1228741fb0a80095b081fea451863b1a536a58263eca3bfcbae42ae3592bd35

  • SSDEEP

    12288:MMrny90LOSd4nSc2eXiqnAsbzTbhxHqOdOgfYG29ptx2DnwUAlkQ+HkQQz:zyYd6LXiqnAsbzTVpd1PnwHqvEQs

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      6c4892ecaf3228cf5d44c30d80bb7924c793272b9827c28a9bed12e194434f61

    • Size

      643KB

    • MD5

      fbb197969ab904aeb032c0fe69aaf39b

    • SHA1

      a6818a18c60d034b85906e615cd73ab6a05fa2fa

    • SHA256

      6c4892ecaf3228cf5d44c30d80bb7924c793272b9827c28a9bed12e194434f61

    • SHA512

      27c41dbc30ec7b892674aefb0333b41fc23cdcaa5ca8d46d52c3e65ec5321e3bd1228741fb0a80095b081fea451863b1a536a58263eca3bfcbae42ae3592bd35

    • SSDEEP

      12288:MMrny90LOSd4nSc2eXiqnAsbzTbhxHqOdOgfYG29ptx2DnwUAlkQ+HkQQz:zyYd6LXiqnAsbzTVpd1PnwHqvEQs

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks