General

  • Target

    de44bc11b4573d735b2a4f100e687abc5f2652e5802372ba5f5d342c9a8a867b

  • Size

    556KB

  • Sample

    241111-jjf9mayqhq

  • MD5

    7179d9e5c580d2e7eb3b748bacc94334

  • SHA1

    12cc52f182ea8fc42b74fc2c2c6f9255b94351c8

  • SHA256

    de44bc11b4573d735b2a4f100e687abc5f2652e5802372ba5f5d342c9a8a867b

  • SHA512

    7b795c2c94a58cf9d85dac42dd88170b4899b48c6d81136856a46916a6469e08789ac3520a4599290de2a71e23ea875cff5acf151c8c0fb04f1cd9e7f5889cc8

  • SSDEEP

    12288:oMr8y90wjyKJ8kBhM/ZIdqOwKWnruLxEYEoqY:kyTBiOdCnitE+

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      de44bc11b4573d735b2a4f100e687abc5f2652e5802372ba5f5d342c9a8a867b

    • Size

      556KB

    • MD5

      7179d9e5c580d2e7eb3b748bacc94334

    • SHA1

      12cc52f182ea8fc42b74fc2c2c6f9255b94351c8

    • SHA256

      de44bc11b4573d735b2a4f100e687abc5f2652e5802372ba5f5d342c9a8a867b

    • SHA512

      7b795c2c94a58cf9d85dac42dd88170b4899b48c6d81136856a46916a6469e08789ac3520a4599290de2a71e23ea875cff5acf151c8c0fb04f1cd9e7f5889cc8

    • SSDEEP

      12288:oMr8y90wjyKJ8kBhM/ZIdqOwKWnruLxEYEoqY:kyTBiOdCnitE+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks