General

  • Target

    2dd523013590af32a3ade3409fa2f92c8244dbd75a43d78acfce11b4ab2999c8.exe

  • Size

    304KB

  • Sample

    241123-h5px8a1key

  • MD5

    145aee95d02386cf7122210f56ddd054

  • SHA1

    c12a49219b4b3d39255fe530db2446646404f0d0

  • SHA256

    2dd523013590af32a3ade3409fa2f92c8244dbd75a43d78acfce11b4ab2999c8

  • SHA512

    068479fc00f3ac7bce60fb92992be2191ca2e6cb594d53b754157ef7fe104e24a0ff9c0fe02d6f6bf4eafd4732cf5f95073484a61307bde2a3a2ee60fae784ed

  • SSDEEP

    6144:KZy+bnr+Sp0yN90QEFStrUjeauxXPbOtBhOBAb7jaw7:zMray90r0QtuxXPbOPUBAPuw7

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Targets

    • Target

      2dd523013590af32a3ade3409fa2f92c8244dbd75a43d78acfce11b4ab2999c8.exe

    • Size

      304KB

    • MD5

      145aee95d02386cf7122210f56ddd054

    • SHA1

      c12a49219b4b3d39255fe530db2446646404f0d0

    • SHA256

      2dd523013590af32a3ade3409fa2f92c8244dbd75a43d78acfce11b4ab2999c8

    • SHA512

      068479fc00f3ac7bce60fb92992be2191ca2e6cb594d53b754157ef7fe104e24a0ff9c0fe02d6f6bf4eafd4732cf5f95073484a61307bde2a3a2ee60fae784ed

    • SSDEEP

      6144:KZy+bnr+Sp0yN90QEFStrUjeauxXPbOtBhOBAb7jaw7:zMray90r0QtuxXPbOPUBAPuw7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks