General

  • Target

    46ad42fb8007ac8cabd4c36ab375a699b5c2f2d8f156e1dcd31608e7ffe04ce0

  • Size

    441KB

  • Sample

    241105-ea5hmsvbpn

  • MD5

    70c74525d60e1b408e2a7393eb7f05ab

  • SHA1

    84a7b766744c80a936c2f07b702c717b05ba76d2

  • SHA256

    46ad42fb8007ac8cabd4c36ab375a699b5c2f2d8f156e1dcd31608e7ffe04ce0

  • SHA512

    a582b306b29c834a72b7db94c821d86cbc74e484e09d502cbaf99930420b21b808e2afae6e7bb9d7e8b7009467f13bb2a6ddcc5546cf0b776401d9a20fada35e

  • SSDEEP

    6144:Kwy+bnr+Lp0yN90QEoGYRDrn52gmMxkARcAZNYz3C2IOO5cA0FhcnytE93PrLriy:cMrPy90CGCDdsmZI3E5QNE93PrXiy

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      46ad42fb8007ac8cabd4c36ab375a699b5c2f2d8f156e1dcd31608e7ffe04ce0

    • Size

      441KB

    • MD5

      70c74525d60e1b408e2a7393eb7f05ab

    • SHA1

      84a7b766744c80a936c2f07b702c717b05ba76d2

    • SHA256

      46ad42fb8007ac8cabd4c36ab375a699b5c2f2d8f156e1dcd31608e7ffe04ce0

    • SHA512

      a582b306b29c834a72b7db94c821d86cbc74e484e09d502cbaf99930420b21b808e2afae6e7bb9d7e8b7009467f13bb2a6ddcc5546cf0b776401d9a20fada35e

    • SSDEEP

      6144:Kwy+bnr+Lp0yN90QEoGYRDrn52gmMxkARcAZNYz3C2IOO5cA0FhcnytE93PrLriy:cMrPy90CGCDdsmZI3E5QNE93PrXiy

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks