General

  • Target

    19ba81305f49ec9c5d2810e89f7f03a2dc4c989d589c888bf716e1e5104b9620

  • Size

    479KB

  • Sample

    241111-c6z7patrck

  • MD5

    1259f8c92ea8397cb6e42cd8cd9f09c2

  • SHA1

    e7a836cbadf53a6937a0ae0eac9e93ca7d8c5cd0

  • SHA256

    19ba81305f49ec9c5d2810e89f7f03a2dc4c989d589c888bf716e1e5104b9620

  • SHA512

    87a7640a9d89ff723ff41ab16dec26d29d223b6138cd54d897f2b3bd1bcb8560a0f57e9b448b8c7d5055f5513654f4a0b942b6f79ea9acf8a9c2c8b4903b108b

  • SSDEEP

    12288:mMrKy90386MjnOdtTgRzSqiRcZ8VghJ6zgcdqP:QyWcCs2q4iOUcdG

Malware Config

Extracted

Family

redline

Botnet

divan

C2

217.196.96.102:4132

Attributes
  • auth_value

    b414986bebd7f5a3ec9aee0341b8e769

Targets

    • Target

      19ba81305f49ec9c5d2810e89f7f03a2dc4c989d589c888bf716e1e5104b9620

    • Size

      479KB

    • MD5

      1259f8c92ea8397cb6e42cd8cd9f09c2

    • SHA1

      e7a836cbadf53a6937a0ae0eac9e93ca7d8c5cd0

    • SHA256

      19ba81305f49ec9c5d2810e89f7f03a2dc4c989d589c888bf716e1e5104b9620

    • SHA512

      87a7640a9d89ff723ff41ab16dec26d29d223b6138cd54d897f2b3bd1bcb8560a0f57e9b448b8c7d5055f5513654f4a0b942b6f79ea9acf8a9c2c8b4903b108b

    • SSDEEP

      12288:mMrKy90386MjnOdtTgRzSqiRcZ8VghJ6zgcdqP:QyWcCs2q4iOUcdG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks