General

  • Target

    e341189857efc26e05e358776c34570cefb0972d3183add22cc20e6883d1de77

  • Size

    566KB

  • Sample

    241110-yzs1pavbnc

  • MD5

    508a5e495d09319f6dbeae8652653c53

  • SHA1

    cd6fc8051cb9feaad3b40878b44998be184a3103

  • SHA256

    e341189857efc26e05e358776c34570cefb0972d3183add22cc20e6883d1de77

  • SHA512

    ee05e30f3973d91ad4bfa20666a77c5bfc33ded4ec43d0f5ea275045087e7a2464d5b2a986f9c15a723822b0e4bd40a8dc8773be3ed8d9d13d306e22837f32e0

  • SSDEEP

    12288:BMrjy9006dP5KhfrUk+9ePDFIShUhV8hwrX9TjKV4QcqP:6yadIGfsSS2HCwpTm+Xm

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      e341189857efc26e05e358776c34570cefb0972d3183add22cc20e6883d1de77

    • Size

      566KB

    • MD5

      508a5e495d09319f6dbeae8652653c53

    • SHA1

      cd6fc8051cb9feaad3b40878b44998be184a3103

    • SHA256

      e341189857efc26e05e358776c34570cefb0972d3183add22cc20e6883d1de77

    • SHA512

      ee05e30f3973d91ad4bfa20666a77c5bfc33ded4ec43d0f5ea275045087e7a2464d5b2a986f9c15a723822b0e4bd40a8dc8773be3ed8d9d13d306e22837f32e0

    • SSDEEP

      12288:BMrjy9006dP5KhfrUk+9ePDFIShUhV8hwrX9TjKV4QcqP:6yadIGfsSS2HCwpTm+Xm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks