General

  • Target

    881f0cd0bc4d2c277eba3e521643dce36dabe6826174e965b86b1d0a74f68acb

  • Size

    433KB

  • Sample

    241107-r6mc6athqq

  • MD5

    d64a96a35295f0ab166b2031301b3de7

  • SHA1

    110e7ac5d247df3ebd170b45fa6d6f322e88e487

  • SHA256

    881f0cd0bc4d2c277eba3e521643dce36dabe6826174e965b86b1d0a74f68acb

  • SHA512

    4bbc9125a631d29345cfb2a1aaf60aac77dcbfebd5c3b3fd298e8f5b7620a4212eb28b1803f9a82a4f8809033c3733a2bdfa27392c696e8851cf39a5804a6364

  • SSDEEP

    12288:yMr9y90U4XRvRErb32/b9lF5uBpFU2IAFX1Ju4jMAegJTl:vyqvib3qupeAl3Utsh

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      881f0cd0bc4d2c277eba3e521643dce36dabe6826174e965b86b1d0a74f68acb

    • Size

      433KB

    • MD5

      d64a96a35295f0ab166b2031301b3de7

    • SHA1

      110e7ac5d247df3ebd170b45fa6d6f322e88e487

    • SHA256

      881f0cd0bc4d2c277eba3e521643dce36dabe6826174e965b86b1d0a74f68acb

    • SHA512

      4bbc9125a631d29345cfb2a1aaf60aac77dcbfebd5c3b3fd298e8f5b7620a4212eb28b1803f9a82a4f8809033c3733a2bdfa27392c696e8851cf39a5804a6364

    • SSDEEP

      12288:yMr9y90U4XRvRErb32/b9lF5uBpFU2IAFX1Ju4jMAegJTl:vyqvib3qupeAl3Utsh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks