General

  • Target

    6c2ea2c32e514e6eb5bb4c612edaa0c98b5fd11b2211e5b72c26d8400e41460a.exe

  • Size

    843KB

  • Sample

    241114-hjfgnavle1

  • MD5

    6b6729fe4e7d938490e589ed1cb4152b

  • SHA1

    947c2d774ca0ce2c4787d817ed985dbeb81ebc90

  • SHA256

    6c2ea2c32e514e6eb5bb4c612edaa0c98b5fd11b2211e5b72c26d8400e41460a

  • SHA512

    c4df5e8a05c87870bcca1f0eff3b98e19da036eef9345119b8a0c74ad12e73235c65da218e734ad45ea2af54a6847050c6ade2490180c7f56db3a304d0fcac40

  • SSDEEP

    12288:Fy90lxqkHHyV1UmuEl3y+iDg8k+1TnR6NONN7FiDul8SYb/F+tK/+KIHOzva:FyLduaaf/jbgKuSS/QtK/+KImva

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Targets

    • Target

      6c2ea2c32e514e6eb5bb4c612edaa0c98b5fd11b2211e5b72c26d8400e41460a.exe

    • Size

      843KB

    • MD5

      6b6729fe4e7d938490e589ed1cb4152b

    • SHA1

      947c2d774ca0ce2c4787d817ed985dbeb81ebc90

    • SHA256

      6c2ea2c32e514e6eb5bb4c612edaa0c98b5fd11b2211e5b72c26d8400e41460a

    • SHA512

      c4df5e8a05c87870bcca1f0eff3b98e19da036eef9345119b8a0c74ad12e73235c65da218e734ad45ea2af54a6847050c6ade2490180c7f56db3a304d0fcac40

    • SSDEEP

      12288:Fy90lxqkHHyV1UmuEl3y+iDg8k+1TnR6NONN7FiDul8SYb/F+tK/+KIHOzva:FyLduaaf/jbgKuSS/QtK/+KImva

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks