General

  • Target

    7a245a33089d1def7ab6b7ac8823e9924f766790c5b26f5173b0ae33e1330090

  • Size

    566KB

  • Sample

    241111-jaflqsvhmq

  • MD5

    557e06da0b4fa94b2de13560e2d1c1fc

  • SHA1

    40428a0da48c55af927820d9b433359364ba080e

  • SHA256

    7a245a33089d1def7ab6b7ac8823e9924f766790c5b26f5173b0ae33e1330090

  • SHA512

    71dadfb5da6caa8abbe6389e7ac010b67332ae74483f7ec05fcd78dd9981cba3670107733125905724730811e249499c68a52e75e1e1a965ae27061df59c371d

  • SSDEEP

    12288:pMrFy90T3PocOIAHigvLoNmtHL66SvH8ijoqoBPAYAn:YyOQxIoiCLvtHL66Svca0Pls

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      7a245a33089d1def7ab6b7ac8823e9924f766790c5b26f5173b0ae33e1330090

    • Size

      566KB

    • MD5

      557e06da0b4fa94b2de13560e2d1c1fc

    • SHA1

      40428a0da48c55af927820d9b433359364ba080e

    • SHA256

      7a245a33089d1def7ab6b7ac8823e9924f766790c5b26f5173b0ae33e1330090

    • SHA512

      71dadfb5da6caa8abbe6389e7ac010b67332ae74483f7ec05fcd78dd9981cba3670107733125905724730811e249499c68a52e75e1e1a965ae27061df59c371d

    • SSDEEP

      12288:pMrFy90T3PocOIAHigvLoNmtHL66SvH8ijoqoBPAYAn:YyOQxIoiCLvtHL66Svca0Pls

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks