General

  • Target

    b30a5ae1c994e0686db7782fdc83560c98319e737ad250ccca28a404a08a94e3

  • Size

    441KB

  • Sample

    241110-1bw4jswclf

  • MD5

    5883e405adfdf5022fa0e9b3f40043c4

  • SHA1

    16b4a313523a39cb00e79e0113f035f5074948bf

  • SHA256

    b30a5ae1c994e0686db7782fdc83560c98319e737ad250ccca28a404a08a94e3

  • SHA512

    ce5e7ac5ef24b4136bb1bf6ad88edb073063b65c122db5928ae2f0d5cbf71aa4875232d1c1a14426723d5a2457859fc958a52821f993a80bd2cfda00cbe216b2

  • SSDEEP

    6144:K0y+bnr+mp0yN90QE3g4PJQbWq0EmKqAHzME/lvB9qo0tE03exCvpidWb+lmr:oMrKy90lFq3CSQCZ+N3exoigbp

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      b30a5ae1c994e0686db7782fdc83560c98319e737ad250ccca28a404a08a94e3

    • Size

      441KB

    • MD5

      5883e405adfdf5022fa0e9b3f40043c4

    • SHA1

      16b4a313523a39cb00e79e0113f035f5074948bf

    • SHA256

      b30a5ae1c994e0686db7782fdc83560c98319e737ad250ccca28a404a08a94e3

    • SHA512

      ce5e7ac5ef24b4136bb1bf6ad88edb073063b65c122db5928ae2f0d5cbf71aa4875232d1c1a14426723d5a2457859fc958a52821f993a80bd2cfda00cbe216b2

    • SSDEEP

      6144:K0y+bnr+mp0yN90QE3g4PJQbWq0EmKqAHzME/lvB9qo0tE03exCvpidWb+lmr:oMrKy90lFq3CSQCZ+N3exoigbp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks