General

  • Target

    188e28b4a22e4c0842f094042c7c8f5591fca00c7ce2001122cb278c4918cfda

  • Size

    480KB

  • Sample

    241111-csl3xazgmq

  • MD5

    6264bb975548ea74d92d0d05e1f4df1d

  • SHA1

    0b51b2e01a23ec832bb8fc59d11784f55b37b35d

  • SHA256

    188e28b4a22e4c0842f094042c7c8f5591fca00c7ce2001122cb278c4918cfda

  • SHA512

    47ca8d11dbbf86400c770fa0fad6194ac61e6b5a0e307695a3f2a0b7e090e1fb6e1f07bb0193d71b657202702008411b3beafb7cd9f6f6ff2fcb5bb19c554431

  • SSDEEP

    12288:1Mrry90libA9cFzL1FR10mvyFb6oTdYvNU:+y6i0qnrRviRJH

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      188e28b4a22e4c0842f094042c7c8f5591fca00c7ce2001122cb278c4918cfda

    • Size

      480KB

    • MD5

      6264bb975548ea74d92d0d05e1f4df1d

    • SHA1

      0b51b2e01a23ec832bb8fc59d11784f55b37b35d

    • SHA256

      188e28b4a22e4c0842f094042c7c8f5591fca00c7ce2001122cb278c4918cfda

    • SHA512

      47ca8d11dbbf86400c770fa0fad6194ac61e6b5a0e307695a3f2a0b7e090e1fb6e1f07bb0193d71b657202702008411b3beafb7cd9f6f6ff2fcb5bb19c554431

    • SSDEEP

      12288:1Mrry90libA9cFzL1FR10mvyFb6oTdYvNU:+y6i0qnrRviRJH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks