General

  • Target

    cf5ca566649cbc9203c02770e68397c5b86ba79a601ab8a5f0bb993f674e6a6f

  • Size

    433KB

  • Sample

    241105-gkeq3swbna

  • MD5

    dea4880b9c1aaf0ae70c2927604e0bc1

  • SHA1

    745b0f8ad72666e09c9880da2aa93c5792d3b3c9

  • SHA256

    cf5ca566649cbc9203c02770e68397c5b86ba79a601ab8a5f0bb993f674e6a6f

  • SHA512

    178a954291f2bd931028f9d5b8618a3ca1464b9d740b78d061de28720187143d169322233a7cda5efe1473f125fa65cb765a187ffa3606e2c14d05e3ffc065db

  • SSDEEP

    12288:zMrzy90Y78bm8q4pif/DdRm19HgnHkXQ0Tii:oyYmX7Dd0XAEg2B

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      cf5ca566649cbc9203c02770e68397c5b86ba79a601ab8a5f0bb993f674e6a6f

    • Size

      433KB

    • MD5

      dea4880b9c1aaf0ae70c2927604e0bc1

    • SHA1

      745b0f8ad72666e09c9880da2aa93c5792d3b3c9

    • SHA256

      cf5ca566649cbc9203c02770e68397c5b86ba79a601ab8a5f0bb993f674e6a6f

    • SHA512

      178a954291f2bd931028f9d5b8618a3ca1464b9d740b78d061de28720187143d169322233a7cda5efe1473f125fa65cb765a187ffa3606e2c14d05e3ffc065db

    • SSDEEP

      12288:zMrzy90Y78bm8q4pif/DdRm19HgnHkXQ0Tii:oyYmX7Dd0XAEg2B

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks