General

  • Target

    4eec03f6927a011a183b11d815bbbac6e0f7d92e1060412932a3cbbe531848d8

  • Size

    480KB

  • Sample

    241110-zfgzravekc

  • MD5

    325fbd596e101fc7bfa489c683ce0f5e

  • SHA1

    e57f0931345c56ba4b6d0c344eb20075d0a41260

  • SHA256

    4eec03f6927a011a183b11d815bbbac6e0f7d92e1060412932a3cbbe531848d8

  • SHA512

    ed7d2d804b9a7200d937d3165f61acf779b653ac33bf76233fb0128f2a69df15f2070f8597a5e80e18a8888952222ab062e1ec38c8e0d35e690352b687ef9e7b

  • SSDEEP

    12288:lMruy90FXbc0CRkleuCPXmBbPaaUgdOB0g:7yoXbcHWlFRbPaaS

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      4eec03f6927a011a183b11d815bbbac6e0f7d92e1060412932a3cbbe531848d8

    • Size

      480KB

    • MD5

      325fbd596e101fc7bfa489c683ce0f5e

    • SHA1

      e57f0931345c56ba4b6d0c344eb20075d0a41260

    • SHA256

      4eec03f6927a011a183b11d815bbbac6e0f7d92e1060412932a3cbbe531848d8

    • SHA512

      ed7d2d804b9a7200d937d3165f61acf779b653ac33bf76233fb0128f2a69df15f2070f8597a5e80e18a8888952222ab062e1ec38c8e0d35e690352b687ef9e7b

    • SSDEEP

      12288:lMruy90FXbc0CRkleuCPXmBbPaaUgdOB0g:7yoXbcHWlFRbPaaS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks