General

  • Target

    9b4836ec708bdd5484335c902d72de9521edfe7089c5b829fd597a4a5d19e257

  • Size

    1.1MB

  • Sample

    241111-lygvta1lhk

  • MD5

    3afc83b51b5b70e94cc0f91b7207f55c

  • SHA1

    96fe940edd4a2f03260badb735c9da72cf2fcbbf

  • SHA256

    9b4836ec708bdd5484335c902d72de9521edfe7089c5b829fd597a4a5d19e257

  • SHA512

    3a2baea272889a89f8918f135a34ef038062376b6609bafbdd7440d73ab4595cd0a27fed973f4d18027bb0e8f57284a3f5358195e1a7a089a3b5460e9854eb3c

  • SSDEEP

    24576:+yHabJfUKKlxL35YaRR9HQ08urM4FPJ3a48gFe612xv:NHQfg35RRjwmgS6gj2

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      9b4836ec708bdd5484335c902d72de9521edfe7089c5b829fd597a4a5d19e257

    • Size

      1.1MB

    • MD5

      3afc83b51b5b70e94cc0f91b7207f55c

    • SHA1

      96fe940edd4a2f03260badb735c9da72cf2fcbbf

    • SHA256

      9b4836ec708bdd5484335c902d72de9521edfe7089c5b829fd597a4a5d19e257

    • SHA512

      3a2baea272889a89f8918f135a34ef038062376b6609bafbdd7440d73ab4595cd0a27fed973f4d18027bb0e8f57284a3f5358195e1a7a089a3b5460e9854eb3c

    • SSDEEP

      24576:+yHabJfUKKlxL35YaRR9HQ08urM4FPJ3a48gFe612xv:NHQfg35RRjwmgS6gj2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks