General

  • Target

    a51ae74b0fb9264ec62d9aeb567aaf2ff132b0fd0019ce3a9c5f6b541793bb6a

  • Size

    442KB

  • Sample

    241107-rjdshasqgy

  • MD5

    3b9a28cacc388d532d4bab869527472e

  • SHA1

    e65fce5494b221f239b999e339e1f4b3a0bfb520

  • SHA256

    a51ae74b0fb9264ec62d9aeb567aaf2ff132b0fd0019ce3a9c5f6b541793bb6a

  • SHA512

    a2f438d10f2a8c8766a0f5bf37f5e841beb1ac5ec395c5ffefb9c5d741d15072897db1473bbffc9f56fe1823eab5709efb5b1178577732cf3fe850bcc1c59ad2

  • SSDEEP

    6144:K/y+bnr+wp0yN90QEaBEyWzP8Hao4s+9V6odP5B/d34Rbs94mp77Lip1HhsD:ZMr4y90s2yQIao4r6opPiRs94NPHSD

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      a51ae74b0fb9264ec62d9aeb567aaf2ff132b0fd0019ce3a9c5f6b541793bb6a

    • Size

      442KB

    • MD5

      3b9a28cacc388d532d4bab869527472e

    • SHA1

      e65fce5494b221f239b999e339e1f4b3a0bfb520

    • SHA256

      a51ae74b0fb9264ec62d9aeb567aaf2ff132b0fd0019ce3a9c5f6b541793bb6a

    • SHA512

      a2f438d10f2a8c8766a0f5bf37f5e841beb1ac5ec395c5ffefb9c5d741d15072897db1473bbffc9f56fe1823eab5709efb5b1178577732cf3fe850bcc1c59ad2

    • SSDEEP

      6144:K/y+bnr+wp0yN90QEaBEyWzP8Hao4s+9V6odP5B/d34Rbs94mp77Lip1HhsD:ZMr4y90s2yQIao4r6opPiRs94NPHSD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks