General

  • Target

    59c3fe15b1675cc91c9c9b6e0d368165c605ae68e00416eb370177c4e0100845.exe

  • Size

    168KB

  • Sample

    241119-ymmm5s1eke

  • MD5

    a93095ccca5434df157c6d1cf8db705d

  • SHA1

    e2cf0e67fe3261fe6e9c9d6bb0abde3a02fe5524

  • SHA256

    59c3fe15b1675cc91c9c9b6e0d368165c605ae68e00416eb370177c4e0100845

  • SHA512

    91b0f8fb472ba1d538a44b777ea5eea3c3df9320aa5480cd18f79bf9524078d76740b3a88cf729b9fc6872d25fbddfe9cb1059a532f1faea11d919407b2c9ddd

  • SSDEEP

    3072:URhnnGhZsW6PqV4QQAtT33mPltVC+8e8hGZ:U3neO3aT33mPltVC+r

Malware Config

Extracted

Family

redline

Botnet

diwer

C2

217.196.96.101:4132

Attributes
  • auth_value

    42abfa9e4f2e290c8bdbc776fd9bb6ad

Targets

    • Target

      59c3fe15b1675cc91c9c9b6e0d368165c605ae68e00416eb370177c4e0100845.exe

    • Size

      168KB

    • MD5

      a93095ccca5434df157c6d1cf8db705d

    • SHA1

      e2cf0e67fe3261fe6e9c9d6bb0abde3a02fe5524

    • SHA256

      59c3fe15b1675cc91c9c9b6e0d368165c605ae68e00416eb370177c4e0100845

    • SHA512

      91b0f8fb472ba1d538a44b777ea5eea3c3df9320aa5480cd18f79bf9524078d76740b3a88cf729b9fc6872d25fbddfe9cb1059a532f1faea11d919407b2c9ddd

    • SSDEEP

      3072:URhnnGhZsW6PqV4QQAtT33mPltVC+8e8hGZ:U3neO3aT33mPltVC+r

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks