General

  • Target

    9df8610b29eba12e586e7491b21b6d5c313c76a882155a23177a2a6e165a4b63

  • Size

    566KB

  • Sample

    241111-gzgh8atmd1

  • MD5

    93466d9da22f16937a8a5d00d749ee5e

  • SHA1

    1e6a8dc2bb94d2d2abafe43771018b18db129126

  • SHA256

    9df8610b29eba12e586e7491b21b6d5c313c76a882155a23177a2a6e165a4b63

  • SHA512

    2fc791d79cef098a7730da78d4afa31a0b99f789cfeda2e03c15bf2f49f6023f9c80ce9e493922faeb81c2400067eecf710599ffeaa4009ebed87d8c344b4c43

  • SSDEEP

    12288:YMrcy901KL1KpYvxiNgLsbHHJYw4dTuDcNYm1eNMpd5i:0yuJNNgLJaDcad1

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      9df8610b29eba12e586e7491b21b6d5c313c76a882155a23177a2a6e165a4b63

    • Size

      566KB

    • MD5

      93466d9da22f16937a8a5d00d749ee5e

    • SHA1

      1e6a8dc2bb94d2d2abafe43771018b18db129126

    • SHA256

      9df8610b29eba12e586e7491b21b6d5c313c76a882155a23177a2a6e165a4b63

    • SHA512

      2fc791d79cef098a7730da78d4afa31a0b99f789cfeda2e03c15bf2f49f6023f9c80ce9e493922faeb81c2400067eecf710599ffeaa4009ebed87d8c344b4c43

    • SSDEEP

      12288:YMrcy901KL1KpYvxiNgLsbHHJYw4dTuDcNYm1eNMpd5i:0yuJNNgLJaDcad1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks