General

  • Target

    e155e3d981c76714f3b4a11cdc359458ab10914af78a4e060ea1f26f8bcccf4a

  • Size

    643KB

  • Sample

    241110-w9f3rssdmn

  • MD5

    fa350a28168f1c6e56d8783cd6de4a77

  • SHA1

    68de43c4ac772131e769f8e86c2013ed7fce1a89

  • SHA256

    e155e3d981c76714f3b4a11cdc359458ab10914af78a4e060ea1f26f8bcccf4a

  • SHA512

    e61615f9331815a60d061875f6fb7cfd2f737a617536a476433c90bc4c4023e3831e44727e86c97284d25094d3bc3526ee2b78cd3284c3a07aa97d8b0e0a5618

  • SSDEEP

    12288:BMrvy90UShy7Jr1/ohBlBRqmwOmS9U4oF2YnornUTuJpxhN/i:6yRrdrmlwnyYo7UiJpxz/i

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      e155e3d981c76714f3b4a11cdc359458ab10914af78a4e060ea1f26f8bcccf4a

    • Size

      643KB

    • MD5

      fa350a28168f1c6e56d8783cd6de4a77

    • SHA1

      68de43c4ac772131e769f8e86c2013ed7fce1a89

    • SHA256

      e155e3d981c76714f3b4a11cdc359458ab10914af78a4e060ea1f26f8bcccf4a

    • SHA512

      e61615f9331815a60d061875f6fb7cfd2f737a617536a476433c90bc4c4023e3831e44727e86c97284d25094d3bc3526ee2b78cd3284c3a07aa97d8b0e0a5618

    • SSDEEP

      12288:BMrvy90UShy7Jr1/ohBlBRqmwOmS9U4oF2YnornUTuJpxhN/i:6yRrdrmlwnyYo7UiJpxz/i

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks