General

  • Target

    10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af

  • Size

    1.1MB

  • Sample

    241111-bml1aasmeq

  • MD5

    603ddcf7d38452d0ba19362c82622e58

  • SHA1

    96fb4f2f21ee3f48a921f270bde6339b7706ed04

  • SHA256

    10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af

  • SHA512

    b6c71b92d3eea1d067e0b8c852d3e398b0bb2aafaf55e5ab580b71e6c01f14214ebfa1b10501b01be7ddad340d72d0b4986b6763a121be96e20b8b0c4829c0b6

  • SSDEEP

    24576:Jy48Lx+qmMyt7gtzl6RMGRfXAdylOigMA53UbcUtbp25bPxKrwksIv:8lxAM6R71XPOiTwU1p21E6I

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af

    • Size

      1.1MB

    • MD5

      603ddcf7d38452d0ba19362c82622e58

    • SHA1

      96fb4f2f21ee3f48a921f270bde6339b7706ed04

    • SHA256

      10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af

    • SHA512

      b6c71b92d3eea1d067e0b8c852d3e398b0bb2aafaf55e5ab580b71e6c01f14214ebfa1b10501b01be7ddad340d72d0b4986b6763a121be96e20b8b0c4829c0b6

    • SSDEEP

      24576:Jy48Lx+qmMyt7gtzl6RMGRfXAdylOigMA53UbcUtbp25bPxKrwksIv:8lxAM6R71XPOiTwU1p21E6I

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks