General

  • Target

    8b03956a6d8581c886a3de95219ecca9d9752340cb141d0645394ab30b90005e

  • Size

    433KB

  • Sample

    241107-pf835ascpr

  • MD5

    a9b5c216b314b70d7eaa219bd13921ae

  • SHA1

    74c19bb0dd547d936eafec4c3362dc75f1ea1ee2

  • SHA256

    8b03956a6d8581c886a3de95219ecca9d9752340cb141d0645394ab30b90005e

  • SHA512

    eca5f736c1fe6a1bbe7a1c7fb88ae1075aa5b030b02aff5b846a38191f67da22abbdba6e3a5f3afa7da95ceca1ac8d29a9f91377f03129aa6b7e894a27a08e11

  • SSDEEP

    6144:KKy+bnr+Mp0yN90QEJYCyep0NxrWVPXHDscBF0N7HiJvXdZwphWgDU6vs7C:OMrky90w9LNxS13DWiRNZwphWUUw

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      8b03956a6d8581c886a3de95219ecca9d9752340cb141d0645394ab30b90005e

    • Size

      433KB

    • MD5

      a9b5c216b314b70d7eaa219bd13921ae

    • SHA1

      74c19bb0dd547d936eafec4c3362dc75f1ea1ee2

    • SHA256

      8b03956a6d8581c886a3de95219ecca9d9752340cb141d0645394ab30b90005e

    • SHA512

      eca5f736c1fe6a1bbe7a1c7fb88ae1075aa5b030b02aff5b846a38191f67da22abbdba6e3a5f3afa7da95ceca1ac8d29a9f91377f03129aa6b7e894a27a08e11

    • SSDEEP

      6144:KKy+bnr+Mp0yN90QEJYCyep0NxrWVPXHDscBF0N7HiJvXdZwphWgDU6vs7C:OMrky90w9LNxS13DWiRNZwphWUUw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks