General

  • Target

    6870c12a0dc4c2a7188cdb415025c6bfcdc8fbf683103a6025749c527fa9b192

  • Size

    1.1MB

  • Sample

    241111-bg639sykht

  • MD5

    d4ed024c5cc5dd81f1f5ee09c1473195

  • SHA1

    8c7e89d4faaea3f2804e163617a08e068a777069

  • SHA256

    6870c12a0dc4c2a7188cdb415025c6bfcdc8fbf683103a6025749c527fa9b192

  • SHA512

    38ecf4c1abeee48e33becdaf0aa552036a93739deda4066edc231ac3cc7b02c4576eebb1543435f37d9fbeda740c74b9ff83a019fc7eee982466fee09cc97e7b

  • SSDEEP

    24576:Ly9o7E8MJpBT5CmdIOT2NpGBntPOTkW8HTnfT7hOxWe:+9WE8M7jdIOTq+gkW8HTnf

Malware Config

Extracted

Family

redline

Botnet

dedu

C2

185.161.248.75:4132

Attributes
  • auth_value

    43fb2cf55df7896aeff6ce27ec070fea

Targets

    • Target

      6870c12a0dc4c2a7188cdb415025c6bfcdc8fbf683103a6025749c527fa9b192

    • Size

      1.1MB

    • MD5

      d4ed024c5cc5dd81f1f5ee09c1473195

    • SHA1

      8c7e89d4faaea3f2804e163617a08e068a777069

    • SHA256

      6870c12a0dc4c2a7188cdb415025c6bfcdc8fbf683103a6025749c527fa9b192

    • SHA512

      38ecf4c1abeee48e33becdaf0aa552036a93739deda4066edc231ac3cc7b02c4576eebb1543435f37d9fbeda740c74b9ff83a019fc7eee982466fee09cc97e7b

    • SSDEEP

      24576:Ly9o7E8MJpBT5CmdIOT2NpGBntPOTkW8HTnfT7hOxWe:+9WE8M7jdIOTq+gkW8HTnf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks