General

  • Target

    ccc190a24905c8b4d3e72989fa727a64a7e309b59fbc051374236d27db4a17e0

  • Size

    479KB

  • Sample

    241111-mbeydaybkf

  • MD5

    1ad1f42ea40c916ab412034534f12390

  • SHA1

    dbc1be7a3fff48166d38a40c69a558ba3af0e43b

  • SHA256

    ccc190a24905c8b4d3e72989fa727a64a7e309b59fbc051374236d27db4a17e0

  • SHA512

    7cec4ce9a54e09768779bd063d3d37687314d99f763fc9dc80990cc617f2750131645f7a350812c706b2f9fba99fe1a4e8a24473b469edb3456c26f1d3721659

  • SSDEEP

    12288:7Mr+y90kpPHWwqAzyDBdBNP+bu1ucpdGzvCD:ZyxDqAGBXl+bRcem

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      ccc190a24905c8b4d3e72989fa727a64a7e309b59fbc051374236d27db4a17e0

    • Size

      479KB

    • MD5

      1ad1f42ea40c916ab412034534f12390

    • SHA1

      dbc1be7a3fff48166d38a40c69a558ba3af0e43b

    • SHA256

      ccc190a24905c8b4d3e72989fa727a64a7e309b59fbc051374236d27db4a17e0

    • SHA512

      7cec4ce9a54e09768779bd063d3d37687314d99f763fc9dc80990cc617f2750131645f7a350812c706b2f9fba99fe1a4e8a24473b469edb3456c26f1d3721659

    • SSDEEP

      12288:7Mr+y90kpPHWwqAzyDBdBNP+bu1ucpdGzvCD:ZyxDqAGBXl+bRcem

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks