General

  • Target

    f695e647ab0629c91106452e581aad62cadd1dc70bfe7d06e3c6e7242d56abc3

  • Size

    874KB

  • Sample

    241111-ccjylszgnf

  • MD5

    904efa646fc488d033278c3f41c6b417

  • SHA1

    b4a48616721006d7410096cb30c43dd9e40448d4

  • SHA256

    f695e647ab0629c91106452e581aad62cadd1dc70bfe7d06e3c6e7242d56abc3

  • SHA512

    7d6bb25d97af9df757a714e885ee2bb67c876b2e4b72b7b9704a25cd232af5252886bcafe5750327ac2b4276c6b505b2218a2929a1956e1ba6e14fd38e233ca8

  • SSDEEP

    12288:pMrRy90f0fYbkniFF6HCntDTGv6mneYqQE0ScsnUI7q2I3cAd3Mc2d82AwMDEk6b:4yo0PiFQHC5T2zEasBusu2d9AwMDtUr

Malware Config

Extracted

Family

redline

Botnet

dimas

C2

185.161.248.75:4132

Attributes
  • auth_value

    a5db9b1c53c704e612bccc93ccdb5539

Targets

    • Target

      f695e647ab0629c91106452e581aad62cadd1dc70bfe7d06e3c6e7242d56abc3

    • Size

      874KB

    • MD5

      904efa646fc488d033278c3f41c6b417

    • SHA1

      b4a48616721006d7410096cb30c43dd9e40448d4

    • SHA256

      f695e647ab0629c91106452e581aad62cadd1dc70bfe7d06e3c6e7242d56abc3

    • SHA512

      7d6bb25d97af9df757a714e885ee2bb67c876b2e4b72b7b9704a25cd232af5252886bcafe5750327ac2b4276c6b505b2218a2929a1956e1ba6e14fd38e233ca8

    • SSDEEP

      12288:pMrRy90f0fYbkniFF6HCntDTGv6mneYqQE0ScsnUI7q2I3cAd3Mc2d82AwMDEk6b:4yo0PiFQHC5T2zEasBusu2d9AwMDtUr

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks