General

  • Target

    8e6ffebcd51b14b8af3e89cb81016ebc82af36fd6e7087299bf61dc6d64803c6

  • Size

    554KB

  • Sample

    241111-kbew9svrcy

  • MD5

    54e726e0aa3d637b9c949d5d5181ad9d

  • SHA1

    baffc8d1751e2e486d500873ef86d5b62938c5d4

  • SHA256

    8e6ffebcd51b14b8af3e89cb81016ebc82af36fd6e7087299bf61dc6d64803c6

  • SHA512

    6ffab677e38662103e0a1fb875aaa84c8ca160a7900437c29e940c656c4197971ced3864fd4bfe4c55ebd30c5ce96a74f479a6f35599816e4fbfddbba7944f5a

  • SSDEEP

    12288:IMrey90KOI60jRVynvmMay29AqublNBCgJRqNSQ+qtzYy5eEi:myzA0N4neML29r7kqNSQ+qt35O

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      8e6ffebcd51b14b8af3e89cb81016ebc82af36fd6e7087299bf61dc6d64803c6

    • Size

      554KB

    • MD5

      54e726e0aa3d637b9c949d5d5181ad9d

    • SHA1

      baffc8d1751e2e486d500873ef86d5b62938c5d4

    • SHA256

      8e6ffebcd51b14b8af3e89cb81016ebc82af36fd6e7087299bf61dc6d64803c6

    • SHA512

      6ffab677e38662103e0a1fb875aaa84c8ca160a7900437c29e940c656c4197971ced3864fd4bfe4c55ebd30c5ce96a74f479a6f35599816e4fbfddbba7944f5a

    • SSDEEP

      12288:IMrey90KOI60jRVynvmMay29AqublNBCgJRqNSQ+qtzYy5eEi:myzA0N4neML29r7kqNSQ+qt35O

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks