General

  • Target

    66f6300c5650cc0551e45b0642acbdfe4a892eb1f48f850c63daa4e3a0ce3672N.exe

  • Size

    175KB

  • Sample

    241114-ef2nyaxqak

  • MD5

    a31204f68a343aa095e60e76fd5d08c0

  • SHA1

    0e8d2c3b4c713fde5d10e5f33a9f0953f802eeb4

  • SHA256

    66f6300c5650cc0551e45b0642acbdfe4a892eb1f48f850c63daa4e3a0ce3672

  • SHA512

    a3658f7dccc386e674d906231b46027057e1cd2dd5ea5133f7958302c832a73e51903da3066feddd14f59f9bd09644522f0f2511bed989c5f424ccddb0492d16

  • SSDEEP

    3072:6xqZWBJaHEDgXTzzfMK8emA9Xh8fxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOG:oqZVTPfBbXh

Malware Config

Extracted

Family

redline

Botnet

dunkan

C2

193.233.20.24:4123

Attributes
  • auth_value

    505c396c57c6287fc3fdc5f3aeab0819

Targets

    • Target

      66f6300c5650cc0551e45b0642acbdfe4a892eb1f48f850c63daa4e3a0ce3672N.exe

    • Size

      175KB

    • MD5

      a31204f68a343aa095e60e76fd5d08c0

    • SHA1

      0e8d2c3b4c713fde5d10e5f33a9f0953f802eeb4

    • SHA256

      66f6300c5650cc0551e45b0642acbdfe4a892eb1f48f850c63daa4e3a0ce3672

    • SHA512

      a3658f7dccc386e674d906231b46027057e1cd2dd5ea5133f7958302c832a73e51903da3066feddd14f59f9bd09644522f0f2511bed989c5f424ccddb0492d16

    • SSDEEP

      3072:6xqZWBJaHEDgXTzzfMK8emA9Xh8fxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOG:oqZVTPfBbXh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks