General

  • Target

    ae68521293a47fe5c65877d5a728fa9e79b8f65c6b35ab8b4d95e6590a5946c0

  • Size

    433KB

  • Sample

    241106-tmh8hawjfm

  • MD5

    7ec45e65270e7faeef8787098e0dfdee

  • SHA1

    0cc0f13515f73cee3941c952474277ad7962ba0e

  • SHA256

    ae68521293a47fe5c65877d5a728fa9e79b8f65c6b35ab8b4d95e6590a5946c0

  • SHA512

    7c0138071543b33c4df9771d3ef3b7912ace7abf38d42500c879886b716f06c0eab66fbd6468d183413ce7621b62347b84e3d2e24bff84ad758a12222c5ee654

  • SSDEEP

    12288:SMrny90P78bm8q4pif/DdRm19HgWMtMJ:tyVmX7Dd0XA1tW

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      ae68521293a47fe5c65877d5a728fa9e79b8f65c6b35ab8b4d95e6590a5946c0

    • Size

      433KB

    • MD5

      7ec45e65270e7faeef8787098e0dfdee

    • SHA1

      0cc0f13515f73cee3941c952474277ad7962ba0e

    • SHA256

      ae68521293a47fe5c65877d5a728fa9e79b8f65c6b35ab8b4d95e6590a5946c0

    • SHA512

      7c0138071543b33c4df9771d3ef3b7912ace7abf38d42500c879886b716f06c0eab66fbd6468d183413ce7621b62347b84e3d2e24bff84ad758a12222c5ee654

    • SSDEEP

      12288:SMrny90P78bm8q4pif/DdRm19HgWMtMJ:tyVmX7Dd0XA1tW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks