General

  • Target

    2ec28ea5a314d9dabca780a81d5175bfd6f7eb860a3f423bb4344f1264986601

  • Size

    479KB

  • Sample

    241111-cwlljszlfv

  • MD5

    757a89485c77c237e0d3f7c469550d05

  • SHA1

    460538392ef2dfd6732efae67f861d42b902cde0

  • SHA256

    2ec28ea5a314d9dabca780a81d5175bfd6f7eb860a3f423bb4344f1264986601

  • SHA512

    f61b30e0d06dce0fa637e681d3bcc01dada88a3d430109039d57121746039f9ee7275fdd340220958952563dd56e8cd8804069dece1d007d46f6cb2d8d8e8946

  • SSDEEP

    6144:Kby+bnr+2p0yN90QEBFQL+1xOPQX8g01tj4Q4GJc9S2ZiT9xDMCALHbUSGrqeINJ:NMr6y90XFQlp1tcQ4D6TwzLA5rq3NQm

Malware Config

Extracted

Family

redline

Botnet

divan

C2

217.196.96.102:4132

Attributes
  • auth_value

    b414986bebd7f5a3ec9aee0341b8e769

Targets

    • Target

      2ec28ea5a314d9dabca780a81d5175bfd6f7eb860a3f423bb4344f1264986601

    • Size

      479KB

    • MD5

      757a89485c77c237e0d3f7c469550d05

    • SHA1

      460538392ef2dfd6732efae67f861d42b902cde0

    • SHA256

      2ec28ea5a314d9dabca780a81d5175bfd6f7eb860a3f423bb4344f1264986601

    • SHA512

      f61b30e0d06dce0fa637e681d3bcc01dada88a3d430109039d57121746039f9ee7275fdd340220958952563dd56e8cd8804069dece1d007d46f6cb2d8d8e8946

    • SSDEEP

      6144:Kby+bnr+2p0yN90QEBFQL+1xOPQX8g01tj4Q4GJc9S2ZiT9xDMCALHbUSGrqeINJ:NMr6y90XFQlp1tcQ4D6TwzLA5rq3NQm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks