General

  • Target

    21eaa56d78c75f92f29f673d52f02f6dad513f3b07f6b0c9daaaf1a9945db4f9

  • Size

    480KB

  • Sample

    241111-bxzdcsspeq

  • MD5

    ada47897ce4f20a8fbf2da11fa71cde4

  • SHA1

    c71aecade764a41557e72448a92a95915afc1c88

  • SHA256

    21eaa56d78c75f92f29f673d52f02f6dad513f3b07f6b0c9daaaf1a9945db4f9

  • SHA512

    b6ca1d2d9a2efe48f94837c612983fd20a63837aa9487b33a65b8a6fced9be9e295d2e11e10ec2cf685c0dd67a9e5fa049107dc1567f095eb118b1bc30931427

  • SSDEEP

    6144:KVy+bnr+Ip0yN90QERwS7rf/epRzde9EGSfJNwrnD+Im5wf5w9cI09E38RXANkGJ:fMrQy90wUEe5wu+nQHSOXAN9xasz7Pj

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      21eaa56d78c75f92f29f673d52f02f6dad513f3b07f6b0c9daaaf1a9945db4f9

    • Size

      480KB

    • MD5

      ada47897ce4f20a8fbf2da11fa71cde4

    • SHA1

      c71aecade764a41557e72448a92a95915afc1c88

    • SHA256

      21eaa56d78c75f92f29f673d52f02f6dad513f3b07f6b0c9daaaf1a9945db4f9

    • SHA512

      b6ca1d2d9a2efe48f94837c612983fd20a63837aa9487b33a65b8a6fced9be9e295d2e11e10ec2cf685c0dd67a9e5fa049107dc1567f095eb118b1bc30931427

    • SSDEEP

      6144:KVy+bnr+Ip0yN90QERwS7rf/epRzde9EGSfJNwrnD+Im5wf5w9cI09E38RXANkGJ:fMrQy90wUEe5wu+nQHSOXAN9xasz7Pj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks