General

  • Target

    e4314d7009d00eb1a7f8ff3c72a902619dea136814f425461cd1af81d81df4ee

  • Size

    644KB

  • Sample

    241111-kz2qyaxdma

  • MD5

    db0aedd36913a0bdae6cd1a64e9891f1

  • SHA1

    ce0a3d2c261d15dd8c8720d482f80f02b150ed80

  • SHA256

    e4314d7009d00eb1a7f8ff3c72a902619dea136814f425461cd1af81d81df4ee

  • SHA512

    332ae17f03dec741a9fc41ec254a50f6f2a42f1ac235091c8c12909da641d4afe7efa56ee23c3e4ba61d338d66bceb83b634e35193321275849fa886f846c842

  • SSDEEP

    12288:BMrDy90EK1vpLlWim26G0oeR8ZUEE0+CoTCbO6rJGzAcE/5e:+yfK1NlWim26GteR8CEqCoT/FkA

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      e4314d7009d00eb1a7f8ff3c72a902619dea136814f425461cd1af81d81df4ee

    • Size

      644KB

    • MD5

      db0aedd36913a0bdae6cd1a64e9891f1

    • SHA1

      ce0a3d2c261d15dd8c8720d482f80f02b150ed80

    • SHA256

      e4314d7009d00eb1a7f8ff3c72a902619dea136814f425461cd1af81d81df4ee

    • SHA512

      332ae17f03dec741a9fc41ec254a50f6f2a42f1ac235091c8c12909da641d4afe7efa56ee23c3e4ba61d338d66bceb83b634e35193321275849fa886f846c842

    • SSDEEP

      12288:BMrDy90EK1vpLlWim26G0oeR8ZUEE0+CoTCbO6rJGzAcE/5e:+yfK1NlWim26GteR8CEqCoT/FkA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks