General

  • Target

    aa9e129bc63957a10f0d9c1bd1de2260b7d3bf16c09431df5f4debe9b33567cf

  • Size

    441KB

  • Sample

    241106-zrq2ssxfnh

  • MD5

    dcc021002472d8479e47afdc309ef354

  • SHA1

    913c68e6b0694d7ef0af9159ce96791d6f15b13d

  • SHA256

    aa9e129bc63957a10f0d9c1bd1de2260b7d3bf16c09431df5f4debe9b33567cf

  • SHA512

    2d103aef184669809d44370e3cf0d355e5613daba369fcbca0c25bb08964130a7e419f73443da8ef9aea460c19ac1c92b93721285b43df195966d047a831aff9

  • SSDEEP

    6144:KMy+bnr+Yp0yN90QEOg4PJQbWq0EmKqAHzME/lvB9qo0tE033xCvrlud0XUMiD:oMr4y90UFq3CSQCZ+N33xAuuXUMiD

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      aa9e129bc63957a10f0d9c1bd1de2260b7d3bf16c09431df5f4debe9b33567cf

    • Size

      441KB

    • MD5

      dcc021002472d8479e47afdc309ef354

    • SHA1

      913c68e6b0694d7ef0af9159ce96791d6f15b13d

    • SHA256

      aa9e129bc63957a10f0d9c1bd1de2260b7d3bf16c09431df5f4debe9b33567cf

    • SHA512

      2d103aef184669809d44370e3cf0d355e5613daba369fcbca0c25bb08964130a7e419f73443da8ef9aea460c19ac1c92b93721285b43df195966d047a831aff9

    • SSDEEP

      6144:KMy+bnr+Yp0yN90QEOg4PJQbWq0EmKqAHzME/lvB9qo0tE033xCvrlud0XUMiD:oMr4y90UFq3CSQCZ+N33xAuuXUMiD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks