General

  • Target

    020906e6abf7b934333aee52c2ca9d38569b7e5a7d57efce063134ea1f9126dc

  • Size

    564KB

  • Sample

    241110-2jf8qswmey

  • MD5

    a3275a37561ac7bf6d90dc0424bde5b2

  • SHA1

    19de196da799d3070a53b905d155ddff737a92f0

  • SHA256

    020906e6abf7b934333aee52c2ca9d38569b7e5a7d57efce063134ea1f9126dc

  • SHA512

    b19e40f6337e0e93fda73922c600039579a0af295d1335086e34c6b9fb0034a3a774a15544e05f059233ac15c646a7c05e5790b34ab803f38df2b17091f20bb7

  • SSDEEP

    12288:6Mrhy90nWVcQuOV6aK66AqVQbH70AZZ8HlCp0l85bhLOK7jM:zynVc06e6rAYAWFCp0lkLOKM

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      020906e6abf7b934333aee52c2ca9d38569b7e5a7d57efce063134ea1f9126dc

    • Size

      564KB

    • MD5

      a3275a37561ac7bf6d90dc0424bde5b2

    • SHA1

      19de196da799d3070a53b905d155ddff737a92f0

    • SHA256

      020906e6abf7b934333aee52c2ca9d38569b7e5a7d57efce063134ea1f9126dc

    • SHA512

      b19e40f6337e0e93fda73922c600039579a0af295d1335086e34c6b9fb0034a3a774a15544e05f059233ac15c646a7c05e5790b34ab803f38df2b17091f20bb7

    • SSDEEP

      12288:6Mrhy90nWVcQuOV6aK66AqVQbH70AZZ8HlCp0l85bhLOK7jM:zynVc06e6rAYAWFCp0lkLOKM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks