General

  • Target

    f5bdcea9be04446c56661ce20d626c7246cd77c982fbe70271b92c0724814103

  • Size

    390KB

  • Sample

    241105-bq26nstnhq

  • MD5

    5629b6736ad7a7612555c32db3b1c54e

  • SHA1

    820315d722e0a92fd103ef32e6115c0925b08d36

  • SHA256

    f5bdcea9be04446c56661ce20d626c7246cd77c982fbe70271b92c0724814103

  • SHA512

    d24eebcab8f6d71329cc0c8295f81cb980c42ad4ba901f2f82868093d2d10ca92a5e7aefe3ae6e8abb7b37f779afe6a31b0f941a3258847ab4925b58656fa489

  • SSDEEP

    12288:vcFdpjyQ1/zijMfdCEKrXCAJNHeA4+2xoXv1y0:k48dCGAJ45SXv1l

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      cc60da460b2f05c9950cd3f17cfe9bcf2701ae63974142b059769a7b92b35d64.exe

    • Size

      440KB

    • MD5

      842f0085fac08ad1da6069c55d4e8662

    • SHA1

      087b59faeff238db35b5dcb4037c469283aeb31a

    • SHA256

      cc60da460b2f05c9950cd3f17cfe9bcf2701ae63974142b059769a7b92b35d64

    • SHA512

      fe16793ae7f2f5f73af757a9ac316f82b751c8a1cdd6437c779fefec023d4a624d1f14eafa07ae9c27f294ac9543f8192917712cad9a5c36088b4d58ee6f6eef

    • SSDEEP

      12288:dMr+y90Qxcr2wrrAOebAYs1zF6KqOP6goaGqNqHGvlB:vy7crZrrAxsT6KqP63v7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks