General

  • Target

    55c0ca464819b30cdba778355a56025dab2e331914c4e21f5bd8e951a5147c3c

  • Size

    441KB

  • Sample

    241109-m9dszawman

  • MD5

    b7ea323fb85127d7e1703a2da5c175dc

  • SHA1

    003a85dd824354ee3cd8e75347e464f8cb20e800

  • SHA256

    55c0ca464819b30cdba778355a56025dab2e331914c4e21f5bd8e951a5147c3c

  • SHA512

    c407c0f71e4869266b60b4ff116410a4488e448475b2793a40cd19b768d99003194ad511c3efe18b0a78c1516ccd79f481578d148563efb531f8e6354a9aa64c

  • SSDEEP

    12288:pMrEy90jOuiXeKJA/LokpJ+y39L+U4h7v2Sx:Ry4ONXAZp0yb4N2Sx

Malware Config

Extracted

Family

redline

Botnet

ramon

C2

193.233.20.23:4123

Attributes
  • auth_value

    3197576965d9513f115338c233015b40

Targets

    • Target

      55c0ca464819b30cdba778355a56025dab2e331914c4e21f5bd8e951a5147c3c

    • Size

      441KB

    • MD5

      b7ea323fb85127d7e1703a2da5c175dc

    • SHA1

      003a85dd824354ee3cd8e75347e464f8cb20e800

    • SHA256

      55c0ca464819b30cdba778355a56025dab2e331914c4e21f5bd8e951a5147c3c

    • SHA512

      c407c0f71e4869266b60b4ff116410a4488e448475b2793a40cd19b768d99003194ad511c3efe18b0a78c1516ccd79f481578d148563efb531f8e6354a9aa64c

    • SSDEEP

      12288:pMrEy90jOuiXeKJA/LokpJ+y39L+U4h7v2Sx:Ry4ONXAZp0yb4N2Sx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks