General

  • Target

    4437ddff709750539d3bae9b3fdd8e9fa8e16943b1e0799bdbaecca3f61e3786

  • Size

    554KB

  • Sample

    241111-dmbwes1jct

  • MD5

    94310ae6b4d8e2065e7d68dbb2f98bdb

  • SHA1

    af130dcaba092c39fb20b3d0e2484d9f2af4f5d2

  • SHA256

    4437ddff709750539d3bae9b3fdd8e9fa8e16943b1e0799bdbaecca3f61e3786

  • SHA512

    c182dbc1a14c356c7e9ecdcf7cab66b2943758db59e3f7386584c813fff7763f5a900e4b744dada7729c9b0004411ddd3344736a22add61c18b5618c89de9045

  • SSDEEP

    12288:vMrWy90Egpj6H9gMIOqJ5U6TWCxI8mkElrbub:5ylE+9zlqJ5hWCPgA

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      4437ddff709750539d3bae9b3fdd8e9fa8e16943b1e0799bdbaecca3f61e3786

    • Size

      554KB

    • MD5

      94310ae6b4d8e2065e7d68dbb2f98bdb

    • SHA1

      af130dcaba092c39fb20b3d0e2484d9f2af4f5d2

    • SHA256

      4437ddff709750539d3bae9b3fdd8e9fa8e16943b1e0799bdbaecca3f61e3786

    • SHA512

      c182dbc1a14c356c7e9ecdcf7cab66b2943758db59e3f7386584c813fff7763f5a900e4b744dada7729c9b0004411ddd3344736a22add61c18b5618c89de9045

    • SSDEEP

      12288:vMrWy90Egpj6H9gMIOqJ5U6TWCxI8mkElrbub:5ylE+9zlqJ5hWCPgA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks