General

  • Target

    00c69aece80cf1caaedd7a82f77c4f9ed4b237d11a19528fc2d450a4cc76fabe

  • Size

    876KB

  • Sample

    241111-c7fjnszpaw

  • MD5

    564643469ac8474d7272a0c04ebaab6b

  • SHA1

    fc985967b2bbbf5de7030ae134a47e6d9fc037c5

  • SHA256

    00c69aece80cf1caaedd7a82f77c4f9ed4b237d11a19528fc2d450a4cc76fabe

  • SHA512

    d2103316bfcd44ab1e7b6a18a3bd43c48396b21b01900b06b7192ceaf5752160f637529cd00f16888628dbb00fa0541c52a06711f376853a40c2336b11aed81f

  • SSDEEP

    24576:Dy4BxxVdXOhqILil5oX3tg1zbvIPjJxUJy8HEV:W4v/d+NLi4tgJbv5sgE

Malware Config

Extracted

Family

redline

Botnet

dimas

C2

185.161.248.75:4132

Attributes
  • auth_value

    a5db9b1c53c704e612bccc93ccdb5539

Targets

    • Target

      00c69aece80cf1caaedd7a82f77c4f9ed4b237d11a19528fc2d450a4cc76fabe

    • Size

      876KB

    • MD5

      564643469ac8474d7272a0c04ebaab6b

    • SHA1

      fc985967b2bbbf5de7030ae134a47e6d9fc037c5

    • SHA256

      00c69aece80cf1caaedd7a82f77c4f9ed4b237d11a19528fc2d450a4cc76fabe

    • SHA512

      d2103316bfcd44ab1e7b6a18a3bd43c48396b21b01900b06b7192ceaf5752160f637529cd00f16888628dbb00fa0541c52a06711f376853a40c2336b11aed81f

    • SSDEEP

      24576:Dy4BxxVdXOhqILil5oX3tg1zbvIPjJxUJy8HEV:W4v/d+NLi4tgJbv5sgE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks