General

  • Target

    595e08ec575490d8fb478e9e541604ff725b66fc64a8191531a3fada3f75ed4b

  • Size

    480KB

  • Sample

    241111-mf993sxhlr

  • MD5

    8fa080c821c984a0fca9532ee0240b34

  • SHA1

    0e04d553a12dabbc553928e94f3b4606a7a10896

  • SHA256

    595e08ec575490d8fb478e9e541604ff725b66fc64a8191531a3fada3f75ed4b

  • SHA512

    6f81118ce6abebe14949e15fecc493bc38cf31445e8388ac8adf9be5723bf2df799b61c5c4048cb6d837295d58914ef2878e74be7b7b3170c82bac324bf9be20

  • SSDEEP

    12288:TMr8y90kZNQvzcDNTXLD7H64cZyqM/K4VVD1:7yPjaoDNTv7HzcsxKCVD1

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      595e08ec575490d8fb478e9e541604ff725b66fc64a8191531a3fada3f75ed4b

    • Size

      480KB

    • MD5

      8fa080c821c984a0fca9532ee0240b34

    • SHA1

      0e04d553a12dabbc553928e94f3b4606a7a10896

    • SHA256

      595e08ec575490d8fb478e9e541604ff725b66fc64a8191531a3fada3f75ed4b

    • SHA512

      6f81118ce6abebe14949e15fecc493bc38cf31445e8388ac8adf9be5723bf2df799b61c5c4048cb6d837295d58914ef2878e74be7b7b3170c82bac324bf9be20

    • SSDEEP

      12288:TMr8y90kZNQvzcDNTXLD7H64cZyqM/K4VVD1:7yPjaoDNTv7HzcsxKCVD1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks