General

  • Target

    5869d1ffcad9a127d859e7a75eb47413d105afba46c319beaa78dda4f0378625

  • Size

    555KB

  • Sample

    241111-byzerayndx

  • MD5

    70eb3e75824a645963fa68f14e8732a8

  • SHA1

    96ddccc5bba996c9f5fc7407ccd2e2ce44f4bccb

  • SHA256

    5869d1ffcad9a127d859e7a75eb47413d105afba46c319beaa78dda4f0378625

  • SHA512

    94d6e41dfdf25929dff526ea839bef99310ac50f05ebb6f616a07b605f0d448b07bbcb789cf28af4b7cb1cbb57fb590b0918dc15615ef6519bcf86b809263553

  • SSDEEP

    12288:lMrty90tZrkYqgvIxT+aYLzB+SG+bg+Px/XSk7arLXngc:Ayui5OIDYLzBHVgMCk7cp

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      5869d1ffcad9a127d859e7a75eb47413d105afba46c319beaa78dda4f0378625

    • Size

      555KB

    • MD5

      70eb3e75824a645963fa68f14e8732a8

    • SHA1

      96ddccc5bba996c9f5fc7407ccd2e2ce44f4bccb

    • SHA256

      5869d1ffcad9a127d859e7a75eb47413d105afba46c319beaa78dda4f0378625

    • SHA512

      94d6e41dfdf25929dff526ea839bef99310ac50f05ebb6f616a07b605f0d448b07bbcb789cf28af4b7cb1cbb57fb590b0918dc15615ef6519bcf86b809263553

    • SSDEEP

      12288:lMrty90tZrkYqgvIxT+aYLzB+SG+bg+Px/XSk7arLXngc:Ayui5OIDYLzBHVgMCk7cp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks