General

  • Target

    baa1f5f604235c36eb7b1e3a4fcc56f2ed1df318c5f59e90bd6b00dddd6088ee

  • Size

    440KB

  • Sample

    241107-nwg4xa1kes

  • MD5

    cbaae495e43da8213e899b1efa0ebe26

  • SHA1

    053ad6ddfb8f7eadedd36b9e0e15d07c6037fae8

  • SHA256

    baa1f5f604235c36eb7b1e3a4fcc56f2ed1df318c5f59e90bd6b00dddd6088ee

  • SHA512

    51e920b2eec2e6a7434f74f47ac1fee77b9ab282a8dc4291c4cffe4a1d3187b17f86acb2ce6e3532a76fef357fb2e3e19f180f7728fe526ded687e2945d23270

  • SSDEEP

    6144:KAy+bnr+tp0yN90QEOwyfkS8XvrLCeoXfjiM0PVd+jkt5y+52VXjHGGZ48OReceH:kMrhy90ZCztPjiOktZ0VXjHTZ4vc9tB

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      baa1f5f604235c36eb7b1e3a4fcc56f2ed1df318c5f59e90bd6b00dddd6088ee

    • Size

      440KB

    • MD5

      cbaae495e43da8213e899b1efa0ebe26

    • SHA1

      053ad6ddfb8f7eadedd36b9e0e15d07c6037fae8

    • SHA256

      baa1f5f604235c36eb7b1e3a4fcc56f2ed1df318c5f59e90bd6b00dddd6088ee

    • SHA512

      51e920b2eec2e6a7434f74f47ac1fee77b9ab282a8dc4291c4cffe4a1d3187b17f86acb2ce6e3532a76fef357fb2e3e19f180f7728fe526ded687e2945d23270

    • SSDEEP

      6144:KAy+bnr+tp0yN90QEOwyfkS8XvrLCeoXfjiM0PVd+jkt5y+52VXjHGGZ48OReceH:kMrhy90ZCztPjiOktZ0VXjHTZ4vc9tB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks