General

  • Target

    c48e9141d981e2b282a889aab671a5201927c8d532fb7c82a6e11f7f5ced3977N.exe

  • Size

    479KB

  • Sample

    241123-n4n77atrgw

  • MD5

    ad6c0a2eca92c1be9b24ea6032a05b40

  • SHA1

    9aa93878e9585e5e65e02684a8c003358f47b31a

  • SHA256

    c48e9141d981e2b282a889aab671a5201927c8d532fb7c82a6e11f7f5ced3977

  • SHA512

    7e4961f8eefb3f739838ec4ad43838551d7c5ceafe66d1083893580b5d10bc84fffee4bf8f395a16f366d0249c8d52cf3584061b675d32ac9abd4d1a2df64138

  • SSDEEP

    6144:Kqy+bnr+Xp0yN90QEsxaYDmanepEg1jlp5Lvm4x478WTcWVpGFXlykRLvp06gY/M:SMrHy90cyaYjb5C647He5O6ge9mqU

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      c48e9141d981e2b282a889aab671a5201927c8d532fb7c82a6e11f7f5ced3977N.exe

    • Size

      479KB

    • MD5

      ad6c0a2eca92c1be9b24ea6032a05b40

    • SHA1

      9aa93878e9585e5e65e02684a8c003358f47b31a

    • SHA256

      c48e9141d981e2b282a889aab671a5201927c8d532fb7c82a6e11f7f5ced3977

    • SHA512

      7e4961f8eefb3f739838ec4ad43838551d7c5ceafe66d1083893580b5d10bc84fffee4bf8f395a16f366d0249c8d52cf3584061b675d32ac9abd4d1a2df64138

    • SSDEEP

      6144:Kqy+bnr+Xp0yN90QEsxaYDmanepEg1jlp5Lvm4x478WTcWVpGFXlykRLvp06gY/M:SMrHy90cyaYjb5C647He5O6ge9mqU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks