General

  • Target

    819e71599ecc5a42b49c11ef607132b826158f885c9b797d070eb9f7ff1509d7

  • Size

    433KB

  • Sample

    241107-g4f39axcmd

  • MD5

    98b6ab7cb329ce8bdaa3f091141440a3

  • SHA1

    a0648f292bede0f4c824d1fa98ca429712cc3f71

  • SHA256

    819e71599ecc5a42b49c11ef607132b826158f885c9b797d070eb9f7ff1509d7

  • SHA512

    1feca5634ee1ec635b588e34f7275751be70df5304a68b29e2fb479e258a70af548651007267c9d21ff6c69abda987fcfd4673f80b96af38cf1c0027f9dcc04e

  • SSDEEP

    12288:rMrHy90n78bm8q4pif/DdRm19HgWMtMb:kyJmX7Dd0XA1tY

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      819e71599ecc5a42b49c11ef607132b826158f885c9b797d070eb9f7ff1509d7

    • Size

      433KB

    • MD5

      98b6ab7cb329ce8bdaa3f091141440a3

    • SHA1

      a0648f292bede0f4c824d1fa98ca429712cc3f71

    • SHA256

      819e71599ecc5a42b49c11ef607132b826158f885c9b797d070eb9f7ff1509d7

    • SHA512

      1feca5634ee1ec635b588e34f7275751be70df5304a68b29e2fb479e258a70af548651007267c9d21ff6c69abda987fcfd4673f80b96af38cf1c0027f9dcc04e

    • SSDEEP

      12288:rMrHy90n78bm8q4pif/DdRm19HgWMtMb:kyJmX7Dd0XA1tY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks