General

  • Target

    ae70c6bca21900cd63142ca37fad2d99a0ff0708cc485619301a161d6db2ca55

  • Size

    565KB

  • Sample

    241110-wjk9ssvncn

  • MD5

    5ddd9b0762b6534d945a331fa420ef6d

  • SHA1

    60211695c801f9a27fbb1055f91adf30000c4089

  • SHA256

    ae70c6bca21900cd63142ca37fad2d99a0ff0708cc485619301a161d6db2ca55

  • SHA512

    82f4fad27a67313f83df981edc7c3b3892ac41d41bb51b9a3238d42e7df04c71839e9c25caf4fec5243e7ad2825e1bd55dc49dab77636e67f014e93f544dabcb

  • SSDEEP

    12288:CMrVy90CBMf1kg/Nd2brIs7pRDTo662jI5LECl8eCJWAlHC:/yd+9NdQrLjTF62hCnCi

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      ae70c6bca21900cd63142ca37fad2d99a0ff0708cc485619301a161d6db2ca55

    • Size

      565KB

    • MD5

      5ddd9b0762b6534d945a331fa420ef6d

    • SHA1

      60211695c801f9a27fbb1055f91adf30000c4089

    • SHA256

      ae70c6bca21900cd63142ca37fad2d99a0ff0708cc485619301a161d6db2ca55

    • SHA512

      82f4fad27a67313f83df981edc7c3b3892ac41d41bb51b9a3238d42e7df04c71839e9c25caf4fec5243e7ad2825e1bd55dc49dab77636e67f014e93f544dabcb

    • SSDEEP

      12288:CMrVy90CBMf1kg/Nd2brIs7pRDTo662jI5LECl8eCJWAlHC:/yd+9NdQrLjTF62hCnCi

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks