General

  • Target

    e17cc8776b6f2039efa46b7f2c5c3854bcabd32f8b9a2eef8afa3ac1fa196943

  • Size

    568KB

  • Sample

    241110-y5xk3atnbx

  • MD5

    86ae9a06173c86a913a33582342ef68a

  • SHA1

    cf8576bafbcbb6e3e9f81ac2fcaf8c7a827d2479

  • SHA256

    e17cc8776b6f2039efa46b7f2c5c3854bcabd32f8b9a2eef8afa3ac1fa196943

  • SHA512

    4c8b2be172ffd78dca48967269fbb92daf4a607924caa35143526fedb925b5c458cb5e14fcb01272704da78a9ccc5ebb6bde24666549982ccb807ab847fa15fa

  • SSDEEP

    12288:2MrHy90B3tsOm7kes9o1ZTggo5dRSwn8wWycyUg:5yDOm7dsHnnntn

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      e17cc8776b6f2039efa46b7f2c5c3854bcabd32f8b9a2eef8afa3ac1fa196943

    • Size

      568KB

    • MD5

      86ae9a06173c86a913a33582342ef68a

    • SHA1

      cf8576bafbcbb6e3e9f81ac2fcaf8c7a827d2479

    • SHA256

      e17cc8776b6f2039efa46b7f2c5c3854bcabd32f8b9a2eef8afa3ac1fa196943

    • SHA512

      4c8b2be172ffd78dca48967269fbb92daf4a607924caa35143526fedb925b5c458cb5e14fcb01272704da78a9ccc5ebb6bde24666549982ccb807ab847fa15fa

    • SSDEEP

      12288:2MrHy90B3tsOm7kes9o1ZTggo5dRSwn8wWycyUg:5yDOm7dsHnnntn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks