General

  • Target

    fbd3897a8092f3e205a9d7e5f4a0249467f71cf601458efcd8108eb22addb124

  • Size

    1.1MB

  • Sample

    241110-yzf15avbmd

  • MD5

    4c569653f3b88f3f72090155f9e54008

  • SHA1

    0fb943114d5869e6e00d56b086757cd422c0d988

  • SHA256

    fbd3897a8092f3e205a9d7e5f4a0249467f71cf601458efcd8108eb22addb124

  • SHA512

    ea987579cb35064c7db664be120b41b118ad7c921e1adf38dea3d238fc9b426471664627a6cfde879fa73490d0a86658747992e8fe3b26063014e0d813582016

  • SSDEEP

    24576:YymuTpHaul+IQgvln5XXc+8mVD8k9Z/5LKPwP0zj8RZQ2:fHTp+IjsaVDbpK60zA

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      fbd3897a8092f3e205a9d7e5f4a0249467f71cf601458efcd8108eb22addb124

    • Size

      1.1MB

    • MD5

      4c569653f3b88f3f72090155f9e54008

    • SHA1

      0fb943114d5869e6e00d56b086757cd422c0d988

    • SHA256

      fbd3897a8092f3e205a9d7e5f4a0249467f71cf601458efcd8108eb22addb124

    • SHA512

      ea987579cb35064c7db664be120b41b118ad7c921e1adf38dea3d238fc9b426471664627a6cfde879fa73490d0a86658747992e8fe3b26063014e0d813582016

    • SSDEEP

      24576:YymuTpHaul+IQgvln5XXc+8mVD8k9Z/5LKPwP0zj8RZQ2:fHTp+IjsaVDbpK60zA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks