General

  • Target

    8cc1ca7c41e396d1727a18477423b50e30534b74b36ede665d880aedc0e2fd5f

  • Size

    567KB

  • Sample

    241111-fce67stcqb

  • MD5

    c3184b982d1bef5643c8e3e2e4b5e1cd

  • SHA1

    edc68b7ece39ce0449850c0e165619612a729c9c

  • SHA256

    8cc1ca7c41e396d1727a18477423b50e30534b74b36ede665d880aedc0e2fd5f

  • SHA512

    3418dcb8b144cde16328d4e40db30dc32f721209ca137eb45c801774eadb323fbdbce07ecf02bc4ab892a8bfbbb59581ed481cb07315251a49cd6b8598e8353b

  • SSDEEP

    12288:dMr8y9042ZNpX/+THJgNVSh9YRmFPmMIVyCac:5yLyF+DJ76R5j

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      8cc1ca7c41e396d1727a18477423b50e30534b74b36ede665d880aedc0e2fd5f

    • Size

      567KB

    • MD5

      c3184b982d1bef5643c8e3e2e4b5e1cd

    • SHA1

      edc68b7ece39ce0449850c0e165619612a729c9c

    • SHA256

      8cc1ca7c41e396d1727a18477423b50e30534b74b36ede665d880aedc0e2fd5f

    • SHA512

      3418dcb8b144cde16328d4e40db30dc32f721209ca137eb45c801774eadb323fbdbce07ecf02bc4ab892a8bfbbb59581ed481cb07315251a49cd6b8598e8353b

    • SSDEEP

      12288:dMr8y9042ZNpX/+THJgNVSh9YRmFPmMIVyCac:5yLyF+DJ76R5j

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks