General

  • Target

    2a6f6549f1690366898c9e723ea0f2ff4ee67f436205b7cf657c9a5ea22325e0

  • Size

    441KB

  • Sample

    241105-bgflbasamn

  • MD5

    f154bacd9a2c3f4db974ccadb95e0d8d

  • SHA1

    9540da39b4dd6debae6dc22a0a540ecdef0168aa

  • SHA256

    2a6f6549f1690366898c9e723ea0f2ff4ee67f436205b7cf657c9a5ea22325e0

  • SHA512

    9e11bbb00e8f17de8be47497a136377b6c59908a70cd4245e5a2be8bda40d16207358c9a9e85f72a51f872f510d3c562a601f3b785b2f693822382f894122306

  • SSDEEP

    6144:Kry+bnr+Yp0yN90QEvg4PJQbWq0EmKqAHzME/lvB9qo0tE03exCvpidWb4o:ZMrYy90ZFq3CSQCZ+N3exoigb4o

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      2a6f6549f1690366898c9e723ea0f2ff4ee67f436205b7cf657c9a5ea22325e0

    • Size

      441KB

    • MD5

      f154bacd9a2c3f4db974ccadb95e0d8d

    • SHA1

      9540da39b4dd6debae6dc22a0a540ecdef0168aa

    • SHA256

      2a6f6549f1690366898c9e723ea0f2ff4ee67f436205b7cf657c9a5ea22325e0

    • SHA512

      9e11bbb00e8f17de8be47497a136377b6c59908a70cd4245e5a2be8bda40d16207358c9a9e85f72a51f872f510d3c562a601f3b785b2f693822382f894122306

    • SSDEEP

      6144:Kry+bnr+Yp0yN90QEvg4PJQbWq0EmKqAHzME/lvB9qo0tE03exCvpidWb4o:ZMrYy90ZFq3CSQCZ+N3exoigb4o

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks