General

  • Target

    b91c6ca12c29921a9b567423fcee5ec849621211c45de05407e153f042ae0262

  • Size

    644KB

  • Sample

    241111-nclmzsskdl

  • MD5

    d290283528bccc37f8a35362fa8cbbba

  • SHA1

    c5a5d0d3ae1ec6a2de124e0beabaeca30c6c1291

  • SHA256

    b91c6ca12c29921a9b567423fcee5ec849621211c45de05407e153f042ae0262

  • SHA512

    a19b1d76b38700d1cb73b8cbc288e78bf7916987ea77d2956f560be7bda5c48f7a6b51441872c2e4ae097f10e76af3524702b60e5d9040671d8adf32dd5463d3

  • SSDEEP

    12288:HMrDy901VGmEoMEfafp5qNcqA26W0jGlA2jtcR7aqKZcMJPGb:QywA0Sxgagl/jtc1ahpJPW

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      b91c6ca12c29921a9b567423fcee5ec849621211c45de05407e153f042ae0262

    • Size

      644KB

    • MD5

      d290283528bccc37f8a35362fa8cbbba

    • SHA1

      c5a5d0d3ae1ec6a2de124e0beabaeca30c6c1291

    • SHA256

      b91c6ca12c29921a9b567423fcee5ec849621211c45de05407e153f042ae0262

    • SHA512

      a19b1d76b38700d1cb73b8cbc288e78bf7916987ea77d2956f560be7bda5c48f7a6b51441872c2e4ae097f10e76af3524702b60e5d9040671d8adf32dd5463d3

    • SSDEEP

      12288:HMrDy901VGmEoMEfafp5qNcqA26W0jGlA2jtcR7aqKZcMJPGb:QywA0Sxgagl/jtc1ahpJPW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks