General

  • Target

    25a840ef9ad8bcb00e42b3c203b688c0f8601ef1904d92b5fe94eaca6bf22f6b

  • Size

    480KB

  • Sample

    241111-fqxcmsxjcn

  • MD5

    4e2a9858d15dbd49285cb82bf0ab2aed

  • SHA1

    dce756c132a3e1e411ce9d5d41ed23e68032819d

  • SHA256

    25a840ef9ad8bcb00e42b3c203b688c0f8601ef1904d92b5fe94eaca6bf22f6b

  • SHA512

    418d2296c4a723cafe5d3ff600d5a7f46e5a8eb788c0bb3d239c9a2aa5dc1ec4a4b54f0ec283b0cf3903564e048769af955f8715c45fc4d58b1e5f8b33be3b0f

  • SSDEEP

    12288:tMrSy90if+pHkqt/9Nt1oYju79lbluGaZr:byvf0HPHz1oYjc9FkGk

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      25a840ef9ad8bcb00e42b3c203b688c0f8601ef1904d92b5fe94eaca6bf22f6b

    • Size

      480KB

    • MD5

      4e2a9858d15dbd49285cb82bf0ab2aed

    • SHA1

      dce756c132a3e1e411ce9d5d41ed23e68032819d

    • SHA256

      25a840ef9ad8bcb00e42b3c203b688c0f8601ef1904d92b5fe94eaca6bf22f6b

    • SHA512

      418d2296c4a723cafe5d3ff600d5a7f46e5a8eb788c0bb3d239c9a2aa5dc1ec4a4b54f0ec283b0cf3903564e048769af955f8715c45fc4d58b1e5f8b33be3b0f

    • SSDEEP

      12288:tMrSy90if+pHkqt/9Nt1oYju79lbluGaZr:byvf0HPHz1oYjc9FkGk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks