General

  • Target

    1e52e05caf70c3c0e476accd4f4cab8ff7e7fc98ae74fd7115aa01c156f747c8N.exe

  • Size

    168KB

  • Sample

    241205-jeng5svkfy

  • MD5

    9f5eba0cd4b65300cf16bfe42bca46d0

  • SHA1

    65a9c1e7978342befbf0656c1db94564362c3232

  • SHA256

    1e52e05caf70c3c0e476accd4f4cab8ff7e7fc98ae74fd7115aa01c156f747c8

  • SHA512

    ba40edd43fe72035d5596904821fd4e6a71c021c7d7b75783a4a5e24cb37d1426dabee873d34aae4ae40116d33448ec34cde39a66b31a467b85c4db17563db0b

  • SSDEEP

    3072:8kmfv4r8W2qTvI2t2qVwoMTOIkvl98e8hg:gfvhZ/Rfkvl9

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.75:4132

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      1e52e05caf70c3c0e476accd4f4cab8ff7e7fc98ae74fd7115aa01c156f747c8N.exe

    • Size

      168KB

    • MD5

      9f5eba0cd4b65300cf16bfe42bca46d0

    • SHA1

      65a9c1e7978342befbf0656c1db94564362c3232

    • SHA256

      1e52e05caf70c3c0e476accd4f4cab8ff7e7fc98ae74fd7115aa01c156f747c8

    • SHA512

      ba40edd43fe72035d5596904821fd4e6a71c021c7d7b75783a4a5e24cb37d1426dabee873d34aae4ae40116d33448ec34cde39a66b31a467b85c4db17563db0b

    • SSDEEP

      3072:8kmfv4r8W2qTvI2t2qVwoMTOIkvl98e8hg:gfvhZ/Rfkvl9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks