General

  • Target

    ed07b70c4981c7a82b2124b94e65a161351a4b2be55948ab25179aff2ee90818

  • Size

    480KB

  • Sample

    241110-z89v8symdn

  • MD5

    5a8b9519ac99ec177516675fe6c2809c

  • SHA1

    62eefecb064ea07f76c4abd176918aed9c928f6b

  • SHA256

    ed07b70c4981c7a82b2124b94e65a161351a4b2be55948ab25179aff2ee90818

  • SHA512

    87e677601bc0dbaf707f200823c4481158a8fcf29de29ab2202a2f4f4b43473ee8a4e4c0b6dbef8e98a79e75b4d27df37ea9d387d2d5c3be81f5ba94d2255950

  • SSDEEP

    12288:eMrwy90yhkmFPIBSQbijy6t+ZFZ3MVAyXtKm9URpHJW:6y3KEIo0j6AytKmeT0

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      ed07b70c4981c7a82b2124b94e65a161351a4b2be55948ab25179aff2ee90818

    • Size

      480KB

    • MD5

      5a8b9519ac99ec177516675fe6c2809c

    • SHA1

      62eefecb064ea07f76c4abd176918aed9c928f6b

    • SHA256

      ed07b70c4981c7a82b2124b94e65a161351a4b2be55948ab25179aff2ee90818

    • SHA512

      87e677601bc0dbaf707f200823c4481158a8fcf29de29ab2202a2f4f4b43473ee8a4e4c0b6dbef8e98a79e75b4d27df37ea9d387d2d5c3be81f5ba94d2255950

    • SSDEEP

      12288:eMrwy90yhkmFPIBSQbijy6t+ZFZ3MVAyXtKm9URpHJW:6y3KEIo0j6AytKmeT0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks