General

  • Target

    b43ba70de49a1edec9d5d54dd3a6c9756c14f5e4e5aabca0a7f8b71289fb288e

  • Size

    433KB

  • Sample

    241107-nk6ccs1gqn

  • MD5

    d76bf855d6f3a652cb6819dccd627955

  • SHA1

    4e1fe643535cebdc59067b9b30124610872c9d45

  • SHA256

    b43ba70de49a1edec9d5d54dd3a6c9756c14f5e4e5aabca0a7f8b71289fb288e

  • SHA512

    c5475107f83661bb8697625962836a19013ce8e4dd75933dd88b50a824bfa8db024ee67bc61a39aafc2d7e4c28d1af25170365b74e77f7943927ce1c72cf1c8b

  • SSDEEP

    12288:7Mrfy90K4XRvRErb32/b9lF5uBpFU2IAFX1Ju4jMAegBxX:Qykvib3qupeAl3Utgp

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      b43ba70de49a1edec9d5d54dd3a6c9756c14f5e4e5aabca0a7f8b71289fb288e

    • Size

      433KB

    • MD5

      d76bf855d6f3a652cb6819dccd627955

    • SHA1

      4e1fe643535cebdc59067b9b30124610872c9d45

    • SHA256

      b43ba70de49a1edec9d5d54dd3a6c9756c14f5e4e5aabca0a7f8b71289fb288e

    • SHA512

      c5475107f83661bb8697625962836a19013ce8e4dd75933dd88b50a824bfa8db024ee67bc61a39aafc2d7e4c28d1af25170365b74e77f7943927ce1c72cf1c8b

    • SSDEEP

      12288:7Mrfy90K4XRvRErb32/b9lF5uBpFU2IAFX1Ju4jMAegBxX:Qykvib3qupeAl3Utgp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks