General

  • Target

    54f6e191818a0740aa76a3984775987a943707ac7a721cfc628a9fc46beba705

  • Size

    440KB

  • Sample

    241107-qpjp9sshpe

  • MD5

    426371b86e474c795c8bbc0b56b9f4af

  • SHA1

    e9d14b5a048e7149fdce6f54ea0bff0f4e9859b8

  • SHA256

    54f6e191818a0740aa76a3984775987a943707ac7a721cfc628a9fc46beba705

  • SHA512

    b6048fee2546e82d155fed1f797855f636d0a613c563f11c4e8c7177bcb36e14d2d4cc30972ab7571404e26eeaea7c25d736a6ade1f829c858624f909fee0c4c

  • SSDEEP

    12288:bMrzy902TR5OIiBn6nM33HBBrZiHf3AqGb5NulhccJ78:QyPbdknL3H4FG/ahcc98

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      54f6e191818a0740aa76a3984775987a943707ac7a721cfc628a9fc46beba705

    • Size

      440KB

    • MD5

      426371b86e474c795c8bbc0b56b9f4af

    • SHA1

      e9d14b5a048e7149fdce6f54ea0bff0f4e9859b8

    • SHA256

      54f6e191818a0740aa76a3984775987a943707ac7a721cfc628a9fc46beba705

    • SHA512

      b6048fee2546e82d155fed1f797855f636d0a613c563f11c4e8c7177bcb36e14d2d4cc30972ab7571404e26eeaea7c25d736a6ade1f829c858624f909fee0c4c

    • SSDEEP

      12288:bMrzy902TR5OIiBn6nM33HBBrZiHf3AqGb5NulhccJ78:QyPbdknL3H4FG/ahcc98

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks