General

  • Target

    7bae56e3872316d82be403d5495b25438dac013f63adc62d2799637dbf6808ba

  • Size

    442KB

  • Sample

    241107-rar9jaspc1

  • MD5

    b600cb81471bf1cc65dde3b159fb707e

  • SHA1

    cf7826f76efc9226b5b4af7af231f63e7097aee6

  • SHA256

    7bae56e3872316d82be403d5495b25438dac013f63adc62d2799637dbf6808ba

  • SHA512

    b156776103e4400512c39e4406ea266f752b936afea2af12f88366d0433a678ca255a46214e182039786279f4b660c100fa648a4b25189bcf7c6752910525e7d

  • SSDEEP

    6144:K0y+bnr+rp0yN90QEqev+dIikioG/Zj/fmLLL7kOJnkNqxdIF6lGaAw6LyjUMYPa:wMrny90QTkioGhaL/Bk6eEVD6LI/OtA

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      7bae56e3872316d82be403d5495b25438dac013f63adc62d2799637dbf6808ba

    • Size

      442KB

    • MD5

      b600cb81471bf1cc65dde3b159fb707e

    • SHA1

      cf7826f76efc9226b5b4af7af231f63e7097aee6

    • SHA256

      7bae56e3872316d82be403d5495b25438dac013f63adc62d2799637dbf6808ba

    • SHA512

      b156776103e4400512c39e4406ea266f752b936afea2af12f88366d0433a678ca255a46214e182039786279f4b660c100fa648a4b25189bcf7c6752910525e7d

    • SSDEEP

      6144:K0y+bnr+rp0yN90QEqev+dIikioG/Zj/fmLLL7kOJnkNqxdIF6lGaAw6LyjUMYPa:wMrny90QTkioGhaL/Bk6eEVD6LI/OtA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks