General

  • Target

    c8652ca142996c408b1cab0f452cf0efc8236110d4a5b308877f8c9ceec967dd

  • Size

    441KB

  • Sample

    241107-r9p88awrdn

  • MD5

    c9c2e78f59f56a17f68e5eec368afb7c

  • SHA1

    b35a25812435dfd6c638517e6be10295ab1a59cc

  • SHA256

    c8652ca142996c408b1cab0f452cf0efc8236110d4a5b308877f8c9ceec967dd

  • SHA512

    9091574a81834fd072954a83d4ec93a8eedeadd204e831f018e150bf3c8164c0efe47399c64d0f27cfa521dc969d092cd953ffd07af0c5a5f6a7d3719530465d

  • SSDEEP

    6144:Kty+bnr+Vp0yN90QEoGYRDrn52gmMxkARcAZNYz3C2IOO5cA0FhcnytE93PrLBiB:DMrly90qGCDdsmZI3E5QNE93Prtijl

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      c8652ca142996c408b1cab0f452cf0efc8236110d4a5b308877f8c9ceec967dd

    • Size

      441KB

    • MD5

      c9c2e78f59f56a17f68e5eec368afb7c

    • SHA1

      b35a25812435dfd6c638517e6be10295ab1a59cc

    • SHA256

      c8652ca142996c408b1cab0f452cf0efc8236110d4a5b308877f8c9ceec967dd

    • SHA512

      9091574a81834fd072954a83d4ec93a8eedeadd204e831f018e150bf3c8164c0efe47399c64d0f27cfa521dc969d092cd953ffd07af0c5a5f6a7d3719530465d

    • SSDEEP

      6144:Kty+bnr+Vp0yN90QEoGYRDrn52gmMxkARcAZNYz3C2IOO5cA0FhcnytE93PrLBiB:DMrly90qGCDdsmZI3E5QNE93Prtijl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks