General

  • Target

    d2e72ea71fc45f68f8fea7df90dc3788c641291dccb8f941b43e111b165589e7N.exe

  • Size

    176KB

  • Sample

    241115-s7tz3awhne

  • MD5

    5ffbb46dd5bb35553851ef37daed4a70

  • SHA1

    db22f5335012f5af790b49989cd23843175bdd34

  • SHA256

    d2e72ea71fc45f68f8fea7df90dc3788c641291dccb8f941b43e111b165589e7

  • SHA512

    00c6469c970c44ae51281ab4a6afb32aaaf80edfd792f257db177adb3387f64b5652a90087e4f6d96d8ceff8211afa09eac59144d1ff37e4a255a0a2aedebe9f

  • SSDEEP

    3072:6xqZWBJaHEDgXTzzfMK8emA9Xh8fxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOG:oqZVTPfBbXh

Malware Config

Extracted

Family

redline

Botnet

dunkan

C2

193.233.20.24:4123

Attributes
  • auth_value

    505c396c57c6287fc3fdc5f3aeab0819

Targets

    • Target

      d2e72ea71fc45f68f8fea7df90dc3788c641291dccb8f941b43e111b165589e7N.exe

    • Size

      176KB

    • MD5

      5ffbb46dd5bb35553851ef37daed4a70

    • SHA1

      db22f5335012f5af790b49989cd23843175bdd34

    • SHA256

      d2e72ea71fc45f68f8fea7df90dc3788c641291dccb8f941b43e111b165589e7

    • SHA512

      00c6469c970c44ae51281ab4a6afb32aaaf80edfd792f257db177adb3387f64b5652a90087e4f6d96d8ceff8211afa09eac59144d1ff37e4a255a0a2aedebe9f

    • SSDEEP

      3072:6xqZWBJaHEDgXTzzfMK8emA9Xh8fxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOG:oqZVTPfBbXh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks