General

  • Target

    089a42d3410e19d49665a9564fe931829b62dca0dcfda237acdc9e3b19bfe985

  • Size

    479KB

  • Sample

    241110-w2ejzasfjg

  • MD5

    282867687dc2d048cbea5d55bf2f362e

  • SHA1

    ba1eddf433cdee82234a10c45fc6492189e8284e

  • SHA256

    089a42d3410e19d49665a9564fe931829b62dca0dcfda237acdc9e3b19bfe985

  • SHA512

    93a6956abf10945f93cab17c994b41506690347273014864c048a97bb41d961bccb632e4059bc7095570eb1c86b56c0798c0d8e4ef0b2bd84cab3b71115ad8de

  • SSDEEP

    12288:AMrvy90dMLFlT4pz02iq/5ZQSae5TApV5l:/yJLFlT4R0y/5ZN1NAZl

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      089a42d3410e19d49665a9564fe931829b62dca0dcfda237acdc9e3b19bfe985

    • Size

      479KB

    • MD5

      282867687dc2d048cbea5d55bf2f362e

    • SHA1

      ba1eddf433cdee82234a10c45fc6492189e8284e

    • SHA256

      089a42d3410e19d49665a9564fe931829b62dca0dcfda237acdc9e3b19bfe985

    • SHA512

      93a6956abf10945f93cab17c994b41506690347273014864c048a97bb41d961bccb632e4059bc7095570eb1c86b56c0798c0d8e4ef0b2bd84cab3b71115ad8de

    • SSDEEP

      12288:AMrvy90dMLFlT4pz02iq/5ZQSae5TApV5l:/yJLFlT4R0y/5ZN1NAZl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks