General

  • Target

    d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467

  • Size

    480KB

  • Sample

    241111-bykatszdqh

  • MD5

    71a55dfbde1f3282695dd8cc2ec35955

  • SHA1

    c93660f0848c8af46fb04b043325710ffcae3b2b

  • SHA256

    d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467

  • SHA512

    deae0d41db122d19a98524871e347f5d79b1140a254e295e2af857a385edcac0be86f5d7feaf32cec8177079c76aa0eeb44fc35fdb6ac3b84b53e14758c66232

  • SSDEEP

    12288:UMrwy90di7dAdzaxl8q9vBFrCuCHWE8zeD9s:cyddAzaMkdCuC2E8zIa

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467

    • Size

      480KB

    • MD5

      71a55dfbde1f3282695dd8cc2ec35955

    • SHA1

      c93660f0848c8af46fb04b043325710ffcae3b2b

    • SHA256

      d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467

    • SHA512

      deae0d41db122d19a98524871e347f5d79b1140a254e295e2af857a385edcac0be86f5d7feaf32cec8177079c76aa0eeb44fc35fdb6ac3b84b53e14758c66232

    • SSDEEP

      12288:UMrwy90di7dAdzaxl8q9vBFrCuCHWE8zeD9s:cyddAzaMkdCuC2E8zIa

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks