General

  • Target

    b39e877a642e6c16c1dcce3fa04e480d9826bb6319f335fee23b8fd44e4231ef

  • Size

    479KB

  • Sample

    241110-wg2h1a1mhw

  • MD5

    14bf712883f98f5701bbdcfa82ac4c2a

  • SHA1

    503a6e409e6407f3b949af4006170db7ddd78d24

  • SHA256

    b39e877a642e6c16c1dcce3fa04e480d9826bb6319f335fee23b8fd44e4231ef

  • SHA512

    23913aff5bcdcfb5e3a8d9052c5e4844d92d27473a4d9516ca971b79e9f5cfd6430a1ad8abfdb25b2da0f1def1f833de0e76df4f5a6ef0ba8ddc27169c1bdaca

  • SSDEEP

    12288:iMrMy90Fu96iyHoyNQmEOWiEBOyKqfjjg8Pc:qyGuxyZZEOWiEY9qrjhPc

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      b39e877a642e6c16c1dcce3fa04e480d9826bb6319f335fee23b8fd44e4231ef

    • Size

      479KB

    • MD5

      14bf712883f98f5701bbdcfa82ac4c2a

    • SHA1

      503a6e409e6407f3b949af4006170db7ddd78d24

    • SHA256

      b39e877a642e6c16c1dcce3fa04e480d9826bb6319f335fee23b8fd44e4231ef

    • SHA512

      23913aff5bcdcfb5e3a8d9052c5e4844d92d27473a4d9516ca971b79e9f5cfd6430a1ad8abfdb25b2da0f1def1f833de0e76df4f5a6ef0ba8ddc27169c1bdaca

    • SSDEEP

      12288:iMrMy90Fu96iyHoyNQmEOWiEBOyKqfjjg8Pc:qyGuxyZZEOWiEY9qrjhPc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks