General

  • Target

    54225f229726f8e5deee4295a534428c6549c8fec3057dced478709bdc92d665

  • Size

    479KB

  • Sample

    241111-c9fbpavjal

  • MD5

    c3bce2e6d41ad7d30349d7a45485bf08

  • SHA1

    e11be83a476615318fbcfe56344776b5db0526d9

  • SHA256

    54225f229726f8e5deee4295a534428c6549c8fec3057dced478709bdc92d665

  • SHA512

    07b75fc002ff93b4c002d68fc07889036d16ddb265c598c6cf829d53220f7a34761e6b604acbc92df9ca761460dd8729247208093a68311cf1fa188ac2f7ebd3

  • SSDEEP

    6144:KIy+bnr+Mp0yN90QEQOZD9QyjJtf/NMsGQAxGA4SgYGzIUnirnB+qBly8m3256GC:oMr4y90fD9N/nwGDx4rnZHYILR2sYD

Malware Config

Extracted

Family

redline

Botnet

douma

C2

217.196.96.101:4132

Attributes
  • auth_value

    e7c0659b5f9d26f2f97df8d25fefbb44

Targets

    • Target

      54225f229726f8e5deee4295a534428c6549c8fec3057dced478709bdc92d665

    • Size

      479KB

    • MD5

      c3bce2e6d41ad7d30349d7a45485bf08

    • SHA1

      e11be83a476615318fbcfe56344776b5db0526d9

    • SHA256

      54225f229726f8e5deee4295a534428c6549c8fec3057dced478709bdc92d665

    • SHA512

      07b75fc002ff93b4c002d68fc07889036d16ddb265c598c6cf829d53220f7a34761e6b604acbc92df9ca761460dd8729247208093a68311cf1fa188ac2f7ebd3

    • SSDEEP

      6144:KIy+bnr+Mp0yN90QEQOZD9QyjJtf/NMsGQAxGA4SgYGzIUnirnB+qBly8m3256GC:oMr4y90fD9N/nwGDx4rnZHYILR2sYD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks