General

  • Target

    5efa192096413d4e535f62a48e338937b4ec5698d17b571fa68fb2c7fa1a59c3

  • Size

    433KB

  • Sample

    241110-1d937ayncn

  • MD5

    2cb5164e3cac7de0500fb561b243fb8b

  • SHA1

    1a3a725e02c2eb6e9d74f5ece71a6fe4c855f2ad

  • SHA256

    5efa192096413d4e535f62a48e338937b4ec5698d17b571fa68fb2c7fa1a59c3

  • SHA512

    56a3c64f0731837e537b90808e77c86ecb3e87221e7ae2e1639a11ae4c183545613e3629b5d7f52bf7bcdf562b94fe25bb10b35655a8056fed95ee3a7d544214

  • SSDEEP

    6144:KSy+bnr+hp0yN90QEFZvzD13qCSQdokvJ1R8jiMexn8kz0nXvAZz0ljVczqxYMX3:yMrVy90Z5zBvPudeFy/AZ1CYMXyC7b

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      5efa192096413d4e535f62a48e338937b4ec5698d17b571fa68fb2c7fa1a59c3

    • Size

      433KB

    • MD5

      2cb5164e3cac7de0500fb561b243fb8b

    • SHA1

      1a3a725e02c2eb6e9d74f5ece71a6fe4c855f2ad

    • SHA256

      5efa192096413d4e535f62a48e338937b4ec5698d17b571fa68fb2c7fa1a59c3

    • SHA512

      56a3c64f0731837e537b90808e77c86ecb3e87221e7ae2e1639a11ae4c183545613e3629b5d7f52bf7bcdf562b94fe25bb10b35655a8056fed95ee3a7d544214

    • SSDEEP

      6144:KSy+bnr+hp0yN90QEFZvzD13qCSQdokvJ1R8jiMexn8kz0nXvAZz0ljVczqxYMX3:yMrVy90Z5zBvPudeFy/AZ1CYMXyC7b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks