General

  • Target

    2d9aca0cfa7cc4aeb464264ab7e2db73f1eefb05d62b7d156b8e70c739a7f1d1

  • Size

    770KB

  • Sample

    241111-beax2sykcz

  • MD5

    3a6e057177307fa589d4a2553a1cf9d8

  • SHA1

    48be7612b71389d0ea28dce91ae483bea54c87d2

  • SHA256

    2d9aca0cfa7cc4aeb464264ab7e2db73f1eefb05d62b7d156b8e70c739a7f1d1

  • SHA512

    48785a209dddbaf453877610899f5393970d8997831afcde26353ea79fe5cba5b8f36319a4584820729942dec4f4bb2d12055e032ed7ef5af33ef725c0cfa7d2

  • SSDEEP

    12288:PMrxy90wGTM2Acc60NMeAiYIHC70Up64QmRgI5ZpNefU/mmKUWc:2yHf2CKDIi70Up647gsZpWwmmzt

Malware Config

Extracted

Family

redline

Botnet

debro

C2

185.161.248.75:4132

Attributes
  • auth_value

    18c2c191aebfde5d1787ec8d805a01a8

Targets

    • Target

      2d9aca0cfa7cc4aeb464264ab7e2db73f1eefb05d62b7d156b8e70c739a7f1d1

    • Size

      770KB

    • MD5

      3a6e057177307fa589d4a2553a1cf9d8

    • SHA1

      48be7612b71389d0ea28dce91ae483bea54c87d2

    • SHA256

      2d9aca0cfa7cc4aeb464264ab7e2db73f1eefb05d62b7d156b8e70c739a7f1d1

    • SHA512

      48785a209dddbaf453877610899f5393970d8997831afcde26353ea79fe5cba5b8f36319a4584820729942dec4f4bb2d12055e032ed7ef5af33ef725c0cfa7d2

    • SSDEEP

      12288:PMrxy90wGTM2Acc60NMeAiYIHC70Up64QmRgI5ZpNefU/mmKUWc:2yHf2CKDIi70Up647gsZpWwmmzt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks