General

  • Target

    a48e5d76494c7094c39175043a6b6f85cfa5d52e975ea84752185fb545c4074e

  • Size

    479KB

  • Sample

    241111-kls7mszngk

  • MD5

    579b5ba4582a5ef58becc58e47716615

  • SHA1

    5cca8b93a4bf1f29a8fc17d6fdea11e9b75f28bd

  • SHA256

    a48e5d76494c7094c39175043a6b6f85cfa5d52e975ea84752185fb545c4074e

  • SHA512

    18bbd579d17a3ccb53e93037468d7a6efb29bf31da05eda3ccbdf9ec5d1a57ef65bdfc7d088588b57199149b5a62b688364b04d6b5fabbab41dc94f464ba8e42

  • SSDEEP

    6144:Kry+bnr+np0yN90QEXgvQsddokWsjZNoH5B+dmFgxZ4ohYKE4Ss5fys1D2OmwpYC:NMrPy90FgvQs/9D9Yzy5fuvljzOdaM

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      a48e5d76494c7094c39175043a6b6f85cfa5d52e975ea84752185fb545c4074e

    • Size

      479KB

    • MD5

      579b5ba4582a5ef58becc58e47716615

    • SHA1

      5cca8b93a4bf1f29a8fc17d6fdea11e9b75f28bd

    • SHA256

      a48e5d76494c7094c39175043a6b6f85cfa5d52e975ea84752185fb545c4074e

    • SHA512

      18bbd579d17a3ccb53e93037468d7a6efb29bf31da05eda3ccbdf9ec5d1a57ef65bdfc7d088588b57199149b5a62b688364b04d6b5fabbab41dc94f464ba8e42

    • SSDEEP

      6144:Kry+bnr+np0yN90QEXgvQsddokWsjZNoH5B+dmFgxZ4ohYKE4Ss5fys1D2OmwpYC:NMrPy90FgvQs/9D9Yzy5fuvljzOdaM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks