General

  • Target

    9c272167c4753ba99ac90b41c7bbec73348b18f95bad35e7f60c31e59321c8d2

  • Size

    433KB

  • Sample

    241106-q1ln1a1hmm

  • MD5

    a55be1e2fce1697e99272d071cc6dae6

  • SHA1

    c5458a224987425ad93a8a8587f81312f41f20f8

  • SHA256

    9c272167c4753ba99ac90b41c7bbec73348b18f95bad35e7f60c31e59321c8d2

  • SHA512

    1932f5a582b6a3bdb9a7b74f2ed7660fb572e23d6b1c3daae1848bb5e87f3572dbd80647ef4c9762662f8c805f7077d504f4c2e753e90876b44b550a67a8fd6f

  • SSDEEP

    12288:NMrky9019LNxS13DWiRNZwphWUU4r0UCX:By6LozMphW960pX

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      9c272167c4753ba99ac90b41c7bbec73348b18f95bad35e7f60c31e59321c8d2

    • Size

      433KB

    • MD5

      a55be1e2fce1697e99272d071cc6dae6

    • SHA1

      c5458a224987425ad93a8a8587f81312f41f20f8

    • SHA256

      9c272167c4753ba99ac90b41c7bbec73348b18f95bad35e7f60c31e59321c8d2

    • SHA512

      1932f5a582b6a3bdb9a7b74f2ed7660fb572e23d6b1c3daae1848bb5e87f3572dbd80647ef4c9762662f8c805f7077d504f4c2e753e90876b44b550a67a8fd6f

    • SSDEEP

      12288:NMrky9019LNxS13DWiRNZwphWUU4r0UCX:By6LozMphW960pX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks