General

  • Target

    7d09cb6f631f4caa17ea77571824c1ebc7f687c02420e8055ebc53a72f10a99b

  • Size

    307KB

  • Sample

    241113-3rsgea1fmd

  • MD5

    4bd1fe91ce3733f08aaeceb10778c944

  • SHA1

    82d9ca12c3f0025b070f326fb388e876876a2f5c

  • SHA256

    7d09cb6f631f4caa17ea77571824c1ebc7f687c02420e8055ebc53a72f10a99b

  • SHA512

    870be95f233d8aa277c2cc428d4fca02d2b6bf61aafc7425a83bb123f2ace371a783fd024e43d73e8410ed531f5d45499478ea705da5396967ffe497c666f46b

  • SSDEEP

    6144:Kjy+bnr+2p0yN90QEnwSAlkPGP+sJWbKXm:dMrGy90CrkP3o/Xm

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      7d09cb6f631f4caa17ea77571824c1ebc7f687c02420e8055ebc53a72f10a99b

    • Size

      307KB

    • MD5

      4bd1fe91ce3733f08aaeceb10778c944

    • SHA1

      82d9ca12c3f0025b070f326fb388e876876a2f5c

    • SHA256

      7d09cb6f631f4caa17ea77571824c1ebc7f687c02420e8055ebc53a72f10a99b

    • SHA512

      870be95f233d8aa277c2cc428d4fca02d2b6bf61aafc7425a83bb123f2ace371a783fd024e43d73e8410ed531f5d45499478ea705da5396967ffe497c666f46b

    • SSDEEP

      6144:Kjy+bnr+2p0yN90QEnwSAlkPGP+sJWbKXm:dMrGy90CrkP3o/Xm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks