General

  • Target

    e25564469b041e81e7ba58a0f6d715709ce8525d25c1ea66788aeb38877ff66a

  • Size

    641KB

  • Sample

    241111-gzl4psxqhk

  • MD5

    b26a0b49d4c450ec24179d56f47e8e26

  • SHA1

    571ccf160946f6bf0071e56cbecd8ee8479023ef

  • SHA256

    e25564469b041e81e7ba58a0f6d715709ce8525d25c1ea66788aeb38877ff66a

  • SHA512

    c3949e82a248ce079bd165b19cf7b3712729cb3f69c9848925fbbc8515684b1e11cd4cea9f02089f2e0b98cad187493aeefdf1b6953e26c18548ab0830eb31b1

  • SSDEEP

    12288:MMrzy906JgqnhnMeXHS4qPSmPqXsC0Ksq1TVsEGxv4C8aLAs1Xa:PycshMysqXstqJsEGDFUuXa

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      e25564469b041e81e7ba58a0f6d715709ce8525d25c1ea66788aeb38877ff66a

    • Size

      641KB

    • MD5

      b26a0b49d4c450ec24179d56f47e8e26

    • SHA1

      571ccf160946f6bf0071e56cbecd8ee8479023ef

    • SHA256

      e25564469b041e81e7ba58a0f6d715709ce8525d25c1ea66788aeb38877ff66a

    • SHA512

      c3949e82a248ce079bd165b19cf7b3712729cb3f69c9848925fbbc8515684b1e11cd4cea9f02089f2e0b98cad187493aeefdf1b6953e26c18548ab0830eb31b1

    • SSDEEP

      12288:MMrzy906JgqnhnMeXHS4qPSmPqXsC0Ksq1TVsEGxv4C8aLAs1Xa:PycshMysqXstqJsEGDFUuXa

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks