General

  • Target

    779d2f077ee1bb915384a81eba7ed0718f044fa99f9bf2a7d1489493f3ca6c4d

  • Size

    1.1MB

  • Sample

    241110-vv58ns1jex

  • MD5

    11d154498a080efeb53f5796516771a0

  • SHA1

    4957319a8846f5278429785e19cd74b84bc6631c

  • SHA256

    779d2f077ee1bb915384a81eba7ed0718f044fa99f9bf2a7d1489493f3ca6c4d

  • SHA512

    30126c42d07b41105aa5ae26a2d892e9b26961ac56531d378d31cb2815248a6dc0175a73f61fd7aa113826e484106bf65462d891da0120715d8f5bb9d8a984c7

  • SSDEEP

    24576:Cy5Q6YvCB20wfoYIsUX1O9N0xQelTDc6B0WCk3+pK6LUpaCd:p7Yv50wfolOIaelTY60k3YWaC

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      779d2f077ee1bb915384a81eba7ed0718f044fa99f9bf2a7d1489493f3ca6c4d

    • Size

      1.1MB

    • MD5

      11d154498a080efeb53f5796516771a0

    • SHA1

      4957319a8846f5278429785e19cd74b84bc6631c

    • SHA256

      779d2f077ee1bb915384a81eba7ed0718f044fa99f9bf2a7d1489493f3ca6c4d

    • SHA512

      30126c42d07b41105aa5ae26a2d892e9b26961ac56531d378d31cb2815248a6dc0175a73f61fd7aa113826e484106bf65462d891da0120715d8f5bb9d8a984c7

    • SSDEEP

      24576:Cy5Q6YvCB20wfoYIsUX1O9N0xQelTDc6B0WCk3+pK6LUpaCd:p7Yv50wfolOIaelTY60k3YWaC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks