General

  • Target

    a5d7b37860a1937fc614a26de96b76c5aea0de606d135647747feba4eba3cca3

  • Size

    434KB

  • Sample

    241110-1sln5svrbx

  • MD5

    7fec3d94ad181124b64efbf8fa394860

  • SHA1

    f3ef9b9464e03b330db98a2cbda79869c4790852

  • SHA256

    a5d7b37860a1937fc614a26de96b76c5aea0de606d135647747feba4eba3cca3

  • SHA512

    54bd0daeb1c6117e69918702220662eebf3a92fe9eb04404614086ca3fec555540e3a98085a7b53691694145cc9864d9e01416ff76d9f82b849174e9bb4ae655

  • SSDEEP

    6144:KRy+bnr+pp0yN90QEVb0ZkVFIhHvxg6SdVljJbjT+KMAEBovyGG9fJuwY2qF:LMrBy90v4iSvxgb3l9VXE+vbGH/AF

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      a5d7b37860a1937fc614a26de96b76c5aea0de606d135647747feba4eba3cca3

    • Size

      434KB

    • MD5

      7fec3d94ad181124b64efbf8fa394860

    • SHA1

      f3ef9b9464e03b330db98a2cbda79869c4790852

    • SHA256

      a5d7b37860a1937fc614a26de96b76c5aea0de606d135647747feba4eba3cca3

    • SHA512

      54bd0daeb1c6117e69918702220662eebf3a92fe9eb04404614086ca3fec555540e3a98085a7b53691694145cc9864d9e01416ff76d9f82b849174e9bb4ae655

    • SSDEEP

      6144:KRy+bnr+pp0yN90QEVb0ZkVFIhHvxg6SdVljJbjT+KMAEBovyGG9fJuwY2qF:LMrBy90v4iSvxgb3l9VXE+vbGH/AF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks