General

  • Target

    c7d0889efb54d8ca63ef56b9a126c253e5164f3f35e1761981f02da060c87ab6

  • Size

    433KB

  • Sample

    241106-svt5astbkj

  • MD5

    d4bb01bbc4c671b68943296cdb1ac7a7

  • SHA1

    9f5fd5f82f2dbcb6c6826b13f05d7b8322baf8f7

  • SHA256

    c7d0889efb54d8ca63ef56b9a126c253e5164f3f35e1761981f02da060c87ab6

  • SHA512

    0aacb41ce18f3698e1ca0bfb197ee54c71c4611430442abf25f8c105a486ce08cdc999fc3cdb47d3b24361ab6975294f0405d85f21a0b02dac2b825f37c0fa8d

  • SSDEEP

    12288:pMrPy90K78bm8q4pif/DdRm19HgnHkXh0cyd:my2mX7Dd0XAEx1q

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      c7d0889efb54d8ca63ef56b9a126c253e5164f3f35e1761981f02da060c87ab6

    • Size

      433KB

    • MD5

      d4bb01bbc4c671b68943296cdb1ac7a7

    • SHA1

      9f5fd5f82f2dbcb6c6826b13f05d7b8322baf8f7

    • SHA256

      c7d0889efb54d8ca63ef56b9a126c253e5164f3f35e1761981f02da060c87ab6

    • SHA512

      0aacb41ce18f3698e1ca0bfb197ee54c71c4611430442abf25f8c105a486ce08cdc999fc3cdb47d3b24361ab6975294f0405d85f21a0b02dac2b825f37c0fa8d

    • SSDEEP

      12288:pMrPy90K78bm8q4pif/DdRm19HgnHkXh0cyd:my2mX7Dd0XAEx1q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks