General

  • Target

    ea4b2a9b09d76608735530b992d080ab58fa6b3e1b5d067fc06ffe1e73d480a3

  • Size

    644KB

  • Sample

    241111-lack7axepf

  • MD5

    1b021d52e2f6f672675912d8123a3f81

  • SHA1

    eaa6060692a58243883cd7defdf55bc680fdeac1

  • SHA256

    ea4b2a9b09d76608735530b992d080ab58fa6b3e1b5d067fc06ffe1e73d480a3

  • SHA512

    d12cb077446578408acc44db462f216d87a4d537ca42caff2f198d7e5bccf85ef47586a77cca2e7ded92c17899199111542f0084fb6d91a50158ffb5703cb5d8

  • SSDEEP

    12288:dMrhy904q/X0km2TiHDgtNVDMfWh5Ra757DVO2JAlUs7FsBVJvY:My0lWDmKWhTal7A2JAlUn6

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      ea4b2a9b09d76608735530b992d080ab58fa6b3e1b5d067fc06ffe1e73d480a3

    • Size

      644KB

    • MD5

      1b021d52e2f6f672675912d8123a3f81

    • SHA1

      eaa6060692a58243883cd7defdf55bc680fdeac1

    • SHA256

      ea4b2a9b09d76608735530b992d080ab58fa6b3e1b5d067fc06ffe1e73d480a3

    • SHA512

      d12cb077446578408acc44db462f216d87a4d537ca42caff2f198d7e5bccf85ef47586a77cca2e7ded92c17899199111542f0084fb6d91a50158ffb5703cb5d8

    • SSDEEP

      12288:dMrhy904q/X0km2TiHDgtNVDMfWh5Ra757DVO2JAlUs7FsBVJvY:My0lWDmKWhTal7A2JAlUn6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks