General

  • Target

    bbce777a1a317c7e138de098d88369c9a1ee96d10f3e563f75297e4f5ed64a69

  • Size

    640KB

  • Sample

    241111-bj2xbsygkr

  • MD5

    711f2911ab8adbff2d8779266475a7db

  • SHA1

    e4b425ca2c772843eaf5cf2ffe2dad1c6b0dcc9d

  • SHA256

    bbce777a1a317c7e138de098d88369c9a1ee96d10f3e563f75297e4f5ed64a69

  • SHA512

    3fa33ba8ec239c073d11081f0e9c872007659f16164cb3a497f4fca86ff7431f8f83576a274c1f34a1cef8c41db0018e76d9a2d7e5cb0884a29a08227d170936

  • SSDEEP

    12288:gMrty90zVyVzX4MjVRmgH5g6GhAbUgDlZMyRm8OS9H/3Re0LUkq6V0u:9yOIDb551GYUcRmK9HwKUuj

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      bbce777a1a317c7e138de098d88369c9a1ee96d10f3e563f75297e4f5ed64a69

    • Size

      640KB

    • MD5

      711f2911ab8adbff2d8779266475a7db

    • SHA1

      e4b425ca2c772843eaf5cf2ffe2dad1c6b0dcc9d

    • SHA256

      bbce777a1a317c7e138de098d88369c9a1ee96d10f3e563f75297e4f5ed64a69

    • SHA512

      3fa33ba8ec239c073d11081f0e9c872007659f16164cb3a497f4fca86ff7431f8f83576a274c1f34a1cef8c41db0018e76d9a2d7e5cb0884a29a08227d170936

    • SSDEEP

      12288:gMrty90zVyVzX4MjVRmgH5g6GhAbUgDlZMyRm8OS9H/3Re0LUkq6V0u:9yOIDb551GYUcRmK9HwKUuj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks