General

  • Target

    8ead519fe625136d44acea909d53cce77170f464766ee9866e657d5da3d0ac3dN.exe

  • Size

    383KB

  • Sample

    241114-bec3eascra

  • MD5

    f42d3b2418e9070834ff20c658bda960

  • SHA1

    27e43adf97a15f154f8526713440f47c9ba5c079

  • SHA256

    8ead519fe625136d44acea909d53cce77170f464766ee9866e657d5da3d0ac3d

  • SHA512

    49666c347e7041220c7d41cdcc6e3c71be7c1dc603e647ef2696e4d1df071c09f6e535ffdb05488c75f4ea96c4b7aa46f3d3d52eb7f25d355db406f37f76c504

  • SSDEEP

    6144:KUy+bnr+Vp0yN90QEiUHh4HZn7E1XELEOIHjdY/fR8N2Zt3Ng12YACiU0Wy:UMrpy90zH0gyXIHhY/fR8yNe9ACi9

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      8ead519fe625136d44acea909d53cce77170f464766ee9866e657d5da3d0ac3dN.exe

    • Size

      383KB

    • MD5

      f42d3b2418e9070834ff20c658bda960

    • SHA1

      27e43adf97a15f154f8526713440f47c9ba5c079

    • SHA256

      8ead519fe625136d44acea909d53cce77170f464766ee9866e657d5da3d0ac3d

    • SHA512

      49666c347e7041220c7d41cdcc6e3c71be7c1dc603e647ef2696e4d1df071c09f6e535ffdb05488c75f4ea96c4b7aa46f3d3d52eb7f25d355db406f37f76c504

    • SSDEEP

      6144:KUy+bnr+Vp0yN90QEiUHh4HZn7E1XELEOIHjdY/fR8N2Zt3Ng12YACiU0Wy:UMrpy90zH0gyXIHhY/fR8yNe9ACi9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks