General

  • Target

    c720cf9af16561d0a88aff25c483cd4796bfd247dbbb0d8ff70934c18fe70a36

  • Size

    1.1MB

  • Sample

    241106-syq7tavngk

  • MD5

    fe6c8401f5a15bc56687ef2f2217543c

  • SHA1

    a5deca9e52240686b1c95af52bf420aea1ffc641

  • SHA256

    c720cf9af16561d0a88aff25c483cd4796bfd247dbbb0d8ff70934c18fe70a36

  • SHA512

    5935fe0cf54a1e6eb577fb30da56fd01e1f5d2069d8e70811a84edee08df690738aabd2570705cf9cfc9ddbbb824b2a72d68842478cb9dbf01a30247a3e63d6e

  • SSDEEP

    24576:By/vtTOZhuyzgRgCrpCHQ0+Odfr4y2/20+WzlprDPd0wZuPlz:0/v+AyzDCrpCwhyfRWzlprewcPl

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      c720cf9af16561d0a88aff25c483cd4796bfd247dbbb0d8ff70934c18fe70a36

    • Size

      1.1MB

    • MD5

      fe6c8401f5a15bc56687ef2f2217543c

    • SHA1

      a5deca9e52240686b1c95af52bf420aea1ffc641

    • SHA256

      c720cf9af16561d0a88aff25c483cd4796bfd247dbbb0d8ff70934c18fe70a36

    • SHA512

      5935fe0cf54a1e6eb577fb30da56fd01e1f5d2069d8e70811a84edee08df690738aabd2570705cf9cfc9ddbbb824b2a72d68842478cb9dbf01a30247a3e63d6e

    • SSDEEP

      24576:By/vtTOZhuyzgRgCrpCHQ0+Odfr4y2/20+WzlprDPd0wZuPlz:0/v+AyzDCrpCwhyfRWzlprewcPl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks