General

  • Target

    9ca335f2368a029efb30e55d5424f78d178021779f87b07651ab9f6b6f10e88c.exe

  • Size

    169KB

  • Sample

    241112-rg6qhavajh

  • MD5

    a1ab77d6d91e40492271c81828f11c56

  • SHA1

    70ff3039e4f46e5246494613ece67a051c3e59d2

  • SHA256

    9ca335f2368a029efb30e55d5424f78d178021779f87b07651ab9f6b6f10e88c

  • SHA512

    a7f2330031a8f3d6ecebac9464593cf53f8d7d88dbe80af673a2c4ee43513531558240cf361899d0051cd96861e31cc9f824f8746b474c99017adf4b41d3d98a

  • SSDEEP

    1536:19FKuQhqlVZRGWWwZrC3T3AHHnpX9rQTGqVIbumugSeIsfcNm83wYk08e8hk7:1jPQN93rUpXbqV4MoIsfcNmC8e8hk7

Malware Config

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Targets

    • Target

      9ca335f2368a029efb30e55d5424f78d178021779f87b07651ab9f6b6f10e88c.exe

    • Size

      169KB

    • MD5

      a1ab77d6d91e40492271c81828f11c56

    • SHA1

      70ff3039e4f46e5246494613ece67a051c3e59d2

    • SHA256

      9ca335f2368a029efb30e55d5424f78d178021779f87b07651ab9f6b6f10e88c

    • SHA512

      a7f2330031a8f3d6ecebac9464593cf53f8d7d88dbe80af673a2c4ee43513531558240cf361899d0051cd96861e31cc9f824f8746b474c99017adf4b41d3d98a

    • SSDEEP

      1536:19FKuQhqlVZRGWWwZrC3T3AHHnpX9rQTGqVIbumugSeIsfcNm83wYk08e8hk7:1jPQN93rUpXbqV4MoIsfcNmC8e8hk7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks