General

  • Target

    7b9e6789d0403986b2886853c0c5d5bdcdea4712293220939b835674c022a329

  • Size

    643KB

  • Sample

    241111-hvslcsvjat

  • MD5

    72c17bde79326de82d40cf06b86c62e5

  • SHA1

    56ca8b85ba608c5dc70dea49d5c442cf0bb268c4

  • SHA256

    7b9e6789d0403986b2886853c0c5d5bdcdea4712293220939b835674c022a329

  • SHA512

    2b6288bb1eac346b7c9ff3d25a043bab7b68ad7e0e31946dc36f370e9e27da4cc55aa7c52fd294afaa3ea59feb34867043ccc7a064557f4080229498da51e30c

  • SSDEEP

    12288:dMrvy90G6VCwhxPGHWglaJChYYYR8+O5QDE00LI0jee1xEV:eyX6VJxPqWg2C5O8Vyf0c+v1x0

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      7b9e6789d0403986b2886853c0c5d5bdcdea4712293220939b835674c022a329

    • Size

      643KB

    • MD5

      72c17bde79326de82d40cf06b86c62e5

    • SHA1

      56ca8b85ba608c5dc70dea49d5c442cf0bb268c4

    • SHA256

      7b9e6789d0403986b2886853c0c5d5bdcdea4712293220939b835674c022a329

    • SHA512

      2b6288bb1eac346b7c9ff3d25a043bab7b68ad7e0e31946dc36f370e9e27da4cc55aa7c52fd294afaa3ea59feb34867043ccc7a064557f4080229498da51e30c

    • SSDEEP

      12288:dMrvy90G6VCwhxPGHWglaJChYYYR8+O5QDE00LI0jee1xEV:eyX6VJxPqWg2C5O8Vyf0c+v1x0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks