General

  • Target

    78fcadd2517576f403a45f66975e1d13b7bdf3c4357125177364455af8fe06a7

  • Size

    480KB

  • Sample

    241111-cep8eazdql

  • MD5

    15fd5b8da42493fee8c8b633a16c11f4

  • SHA1

    101eb04d69c941d0f72cb8e2249bc3dc324f1522

  • SHA256

    78fcadd2517576f403a45f66975e1d13b7bdf3c4357125177364455af8fe06a7

  • SHA512

    014980a2578493a80821eaa4cb9f521771eadde0ebec7b83d2561bf3aa17d63b1831901149e7c999570cf1af46d3624a019b7bbe0f911a2349c8dbdd3f28d9bb

  • SSDEEP

    12288:5Mryy90Dr1Hg/YGZfEXH+1MM1fWfXAfmGtrmTTF:Py61Hg/PeXVM1+c+TF

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      78fcadd2517576f403a45f66975e1d13b7bdf3c4357125177364455af8fe06a7

    • Size

      480KB

    • MD5

      15fd5b8da42493fee8c8b633a16c11f4

    • SHA1

      101eb04d69c941d0f72cb8e2249bc3dc324f1522

    • SHA256

      78fcadd2517576f403a45f66975e1d13b7bdf3c4357125177364455af8fe06a7

    • SHA512

      014980a2578493a80821eaa4cb9f521771eadde0ebec7b83d2561bf3aa17d63b1831901149e7c999570cf1af46d3624a019b7bbe0f911a2349c8dbdd3f28d9bb

    • SSDEEP

      12288:5Mryy90Dr1Hg/YGZfEXH+1MM1fWfXAfmGtrmTTF:Py61Hg/PeXVM1+c+TF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks