General

  • Target

    af3ca7a97193fb6a1b0ef5a9b9f003a9dfdceb66f94c71ffe4dfd6f994e0e018

  • Size

    566KB

  • Sample

    241111-mswmfs1qgp

  • MD5

    2802db07c4930a2ad0233379140e419a

  • SHA1

    7399f4e047bdcbd66512b87b8e86c0b2c75d6891

  • SHA256

    af3ca7a97193fb6a1b0ef5a9b9f003a9dfdceb66f94c71ffe4dfd6f994e0e018

  • SHA512

    9fe46f0811e7ff70e2074e9904ce27c7678e33263800363a593a60aee6e5a819eb83510c6b611cd23159128643bf1382674ddc0b3fe41c1411237226dd16a90d

  • SSDEEP

    12288:VMrPy90dw1OVF4GBQK4qG0D6J63Tl+OpDwhHpX/L8G1VJXN:aypDmQK4l0GiTl+Omxx/LT1z9

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      af3ca7a97193fb6a1b0ef5a9b9f003a9dfdceb66f94c71ffe4dfd6f994e0e018

    • Size

      566KB

    • MD5

      2802db07c4930a2ad0233379140e419a

    • SHA1

      7399f4e047bdcbd66512b87b8e86c0b2c75d6891

    • SHA256

      af3ca7a97193fb6a1b0ef5a9b9f003a9dfdceb66f94c71ffe4dfd6f994e0e018

    • SHA512

      9fe46f0811e7ff70e2074e9904ce27c7678e33263800363a593a60aee6e5a819eb83510c6b611cd23159128643bf1382674ddc0b3fe41c1411237226dd16a90d

    • SSDEEP

      12288:VMrPy90dw1OVF4GBQK4qG0D6J63Tl+OpDwhHpX/L8G1VJXN:aypDmQK4l0GiTl+Omxx/LT1z9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks