General

  • Target

    c1cfc943f2d9b36466dc93ad0334c23351957edc2acc9346b8f92929715154a7

  • Size

    384KB

  • Sample

    241120-dxs8fszaqh

  • MD5

    3e989681db12845353666c7c79aae2dc

  • SHA1

    bbdf887bb7c3aedff91dcef8250bdc21d368d2a7

  • SHA256

    c1cfc943f2d9b36466dc93ad0334c23351957edc2acc9346b8f92929715154a7

  • SHA512

    5002c83b958f669f540ed1a5a088813556afcfd5b970c44589aa4b7eefa6a5171a792e86dd233a4f9033f56c6ff39486c802473039f6e8255d0cd5dfd8dbf38e

  • SSDEEP

    12288:mMrdy90HH0g02Peerkezgaz8w4JlsL6B:jy200PxBga4VlB

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      c1cfc943f2d9b36466dc93ad0334c23351957edc2acc9346b8f92929715154a7

    • Size

      384KB

    • MD5

      3e989681db12845353666c7c79aae2dc

    • SHA1

      bbdf887bb7c3aedff91dcef8250bdc21d368d2a7

    • SHA256

      c1cfc943f2d9b36466dc93ad0334c23351957edc2acc9346b8f92929715154a7

    • SHA512

      5002c83b958f669f540ed1a5a088813556afcfd5b970c44589aa4b7eefa6a5171a792e86dd233a4f9033f56c6ff39486c802473039f6e8255d0cd5dfd8dbf38e

    • SSDEEP

      12288:mMrdy90HH0g02Peerkezgaz8w4JlsL6B:jy200PxBga4VlB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks