General

  • Target

    24f689fc4dc8c179f88dadf08abbbec375b5d5b80ee52ada0268a220bb19ac0b

  • Size

    568KB

  • Sample

    241110-vdc6ka1eld

  • MD5

    16bef00e5fcffac8e9b4533151d8f414

  • SHA1

    315dac2a295cc4df0d8b51da19d4896cd40c96e2

  • SHA256

    24f689fc4dc8c179f88dadf08abbbec375b5d5b80ee52ada0268a220bb19ac0b

  • SHA512

    da3626b06b673f7da08959ffe1d7ca3d135f5866e3a6f8d89e79ef95ec039c6d8012cd3f3c8760ad594cedccefa6629f85dd548a3f2af19cab2d645eccd8aadf

  • SSDEEP

    12288:AMrhy90IPeLij20KQqogS3vkb0NeJb0fVfCPu:xyRmLijhKQqIc0gWf1

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      24f689fc4dc8c179f88dadf08abbbec375b5d5b80ee52ada0268a220bb19ac0b

    • Size

      568KB

    • MD5

      16bef00e5fcffac8e9b4533151d8f414

    • SHA1

      315dac2a295cc4df0d8b51da19d4896cd40c96e2

    • SHA256

      24f689fc4dc8c179f88dadf08abbbec375b5d5b80ee52ada0268a220bb19ac0b

    • SHA512

      da3626b06b673f7da08959ffe1d7ca3d135f5866e3a6f8d89e79ef95ec039c6d8012cd3f3c8760ad594cedccefa6629f85dd548a3f2af19cab2d645eccd8aadf

    • SSDEEP

      12288:AMrhy90IPeLij20KQqogS3vkb0NeJb0fVfCPu:xyRmLijhKQqIc0gWf1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks