General

  • Target

    978f3a2c9c84a42b6881b28969a75dfef5bc90a32bcb66c35c5ea29e09a16bd6N.exe

  • Size

    842KB

  • Sample

    241113-g5rldaxblf

  • MD5

    3b35458905f8ac8374e9be5789ae7180

  • SHA1

    5d0fa015e9d74fd307e3cd6500a4cd809f011cd5

  • SHA256

    978f3a2c9c84a42b6881b28969a75dfef5bc90a32bcb66c35c5ea29e09a16bd6

  • SHA512

    7191d9d0d778102bbc9a8353cbdbe4fddb588a8a6500a38f36bed4a71e9e10a85ae1597bb9a9c7d80004289fcd3d74a5c474fe5138cc7b028a63963d598df030

  • SSDEEP

    24576:uySMx/tieq/hok4XXaE96P5UT+wwBxduKg:9SMTieqJok4XXex4xwj

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Targets

    • Target

      978f3a2c9c84a42b6881b28969a75dfef5bc90a32bcb66c35c5ea29e09a16bd6N.exe

    • Size

      842KB

    • MD5

      3b35458905f8ac8374e9be5789ae7180

    • SHA1

      5d0fa015e9d74fd307e3cd6500a4cd809f011cd5

    • SHA256

      978f3a2c9c84a42b6881b28969a75dfef5bc90a32bcb66c35c5ea29e09a16bd6

    • SHA512

      7191d9d0d778102bbc9a8353cbdbe4fddb588a8a6500a38f36bed4a71e9e10a85ae1597bb9a9c7d80004289fcd3d74a5c474fe5138cc7b028a63963d598df030

    • SSDEEP

      24576:uySMx/tieq/hok4XXaE96P5UT+wwBxduKg:9SMTieqJok4XXex4xwj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks