General

  • Target

    af13c261b6153e2fc310dd137236f9b83875c59128d0be78193b31a70db7573c

  • Size

    993KB

  • Sample

    241111-c69q5a1cjj

  • MD5

    e01bd22ea0b25ffb5d7f722c1eff8164

  • SHA1

    29712e60decc9479a64ae525518e87fdebcef707

  • SHA256

    af13c261b6153e2fc310dd137236f9b83875c59128d0be78193b31a70db7573c

  • SHA512

    1419023d79a22c80252e2d6b255edcb166e8d8b6066f0fea7faf60e6e70523419f3380ede4895989cd962a8cd80faf3b116153ebe239adeff90c86a624053051

  • SSDEEP

    24576:yyURNHWE4HMSgat9gAnSMFZ5ClouF83hwUlZVRCYYWn:ZCxwMQ2ebFGouF0hwUlIY

Malware Config

Extracted

Family

redline

Botnet

diora

C2

185.161.248.75:4132

Attributes
  • auth_value

    4c17e0c4a574a5b11a6e41e692dedcb3

Targets

    • Target

      af13c261b6153e2fc310dd137236f9b83875c59128d0be78193b31a70db7573c

    • Size

      993KB

    • MD5

      e01bd22ea0b25ffb5d7f722c1eff8164

    • SHA1

      29712e60decc9479a64ae525518e87fdebcef707

    • SHA256

      af13c261b6153e2fc310dd137236f9b83875c59128d0be78193b31a70db7573c

    • SHA512

      1419023d79a22c80252e2d6b255edcb166e8d8b6066f0fea7faf60e6e70523419f3380ede4895989cd962a8cd80faf3b116153ebe239adeff90c86a624053051

    • SSDEEP

      24576:yyURNHWE4HMSgat9gAnSMFZ5ClouF83hwUlZVRCYYWn:ZCxwMQ2ebFGouF0hwUlIY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks