General

  • Target

    6b50ba61342fdfe55d968aa0c0edbd5e60abe1b1a8af92ad5fdff73f1f4c553c

  • Size

    566KB

  • Sample

    241111-l4my1syakg

  • MD5

    63f0555484031bbf9205e9a218dad1f7

  • SHA1

    3269c5502c2098634e1f6fd2f5e900bb1a1d92c3

  • SHA256

    6b50ba61342fdfe55d968aa0c0edbd5e60abe1b1a8af92ad5fdff73f1f4c553c

  • SHA512

    5185407e37e71a76b687cb3b218fb1ac52c5162ef9d8dbb3074093cffa75c19a8a066376efd57a2cf0d3f115c73a144e9f436862092e1b70be68625c0e205a67

  • SSDEEP

    12288:BMrjy90AUvBSSLOOmqgHWtVMbVKQJHzgiIayHsW:myw7CqISMhKMUNbsW

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      6b50ba61342fdfe55d968aa0c0edbd5e60abe1b1a8af92ad5fdff73f1f4c553c

    • Size

      566KB

    • MD5

      63f0555484031bbf9205e9a218dad1f7

    • SHA1

      3269c5502c2098634e1f6fd2f5e900bb1a1d92c3

    • SHA256

      6b50ba61342fdfe55d968aa0c0edbd5e60abe1b1a8af92ad5fdff73f1f4c553c

    • SHA512

      5185407e37e71a76b687cb3b218fb1ac52c5162ef9d8dbb3074093cffa75c19a8a066376efd57a2cf0d3f115c73a144e9f436862092e1b70be68625c0e205a67

    • SSDEEP

      12288:BMrjy90AUvBSSLOOmqgHWtVMbVKQJHzgiIayHsW:myw7CqISMhKMUNbsW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks