General

  • Target

    9a84d6583154179730c5303b1db890fedf338409614a9690deed7bb94a64281e

  • Size

    440KB

  • Sample

    241106-yrkz4swlaz

  • MD5

    614a9e0556baff98271d50844861f90c

  • SHA1

    a14bcb9d8e1ee8db8edbdbbb3a774b9c61858d3b

  • SHA256

    9a84d6583154179730c5303b1db890fedf338409614a9690deed7bb94a64281e

  • SHA512

    89e429cd8d2821481ae24df6a7a1de121374120d024ff43703b317fbf6f12d96a9cd8bdc1473681a13fd3e59c17de7aaebdb7900bbad91aa4ca22fd166f54cc2

  • SSDEEP

    12288:1Mrby90UTR5OIiBn6nM33HBBrZiHf3AqGb5NulhccHB:myJbdknL3H4FG/ahcch

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      9a84d6583154179730c5303b1db890fedf338409614a9690deed7bb94a64281e

    • Size

      440KB

    • MD5

      614a9e0556baff98271d50844861f90c

    • SHA1

      a14bcb9d8e1ee8db8edbdbbb3a774b9c61858d3b

    • SHA256

      9a84d6583154179730c5303b1db890fedf338409614a9690deed7bb94a64281e

    • SHA512

      89e429cd8d2821481ae24df6a7a1de121374120d024ff43703b317fbf6f12d96a9cd8bdc1473681a13fd3e59c17de7aaebdb7900bbad91aa4ca22fd166f54cc2

    • SSDEEP

      12288:1Mrby90UTR5OIiBn6nM33HBBrZiHf3AqGb5NulhccHB:myJbdknL3H4FG/ahcch

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks