General

  • Target

    f95e1c1618ded394d2dbf84fc637edf71d3d9197a70cddebcede0c8460ebfb1a

  • Size

    587KB

  • Sample

    241111-cdl5csyraz

  • MD5

    0c4463b97da636848bb35ad674006461

  • SHA1

    b4feb5969ee0ad757a5c2d8c25cc7355ffa8846b

  • SHA256

    f95e1c1618ded394d2dbf84fc637edf71d3d9197a70cddebcede0c8460ebfb1a

  • SHA512

    3b4711d4ca769d7520101ca3a43ded15aadfc4d8fa62c7e9195c9ef01a7ae761cda92226b959bf8d11353da067fccde7ce791eaa5335d96095188f095e4dddcf

  • SSDEEP

    12288:vMrxy90pNihi1R7NPEOjAtnOiYzPjs3ebL2yv78aKp:yykoeR9EOjUfYQe32yv78ac

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      f95e1c1618ded394d2dbf84fc637edf71d3d9197a70cddebcede0c8460ebfb1a

    • Size

      587KB

    • MD5

      0c4463b97da636848bb35ad674006461

    • SHA1

      b4feb5969ee0ad757a5c2d8c25cc7355ffa8846b

    • SHA256

      f95e1c1618ded394d2dbf84fc637edf71d3d9197a70cddebcede0c8460ebfb1a

    • SHA512

      3b4711d4ca769d7520101ca3a43ded15aadfc4d8fa62c7e9195c9ef01a7ae761cda92226b959bf8d11353da067fccde7ce791eaa5335d96095188f095e4dddcf

    • SSDEEP

      12288:vMrxy90pNihi1R7NPEOjAtnOiYzPjs3ebL2yv78aKp:yykoeR9EOjUfYQe32yv78ac

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks