General

  • Target

    8d71edc3f73c25cab8ef38eeaef8e1bbf3f02badbc3b5a02d3b835216163657d

  • Size

    680KB

  • Sample

    241110-3g4rpawrb1

  • MD5

    8f6ceca5f977b748ae52773f6ec95fcd

  • SHA1

    43a61b8ba738561a4a048ac239f0082a7b4e0795

  • SHA256

    8d71edc3f73c25cab8ef38eeaef8e1bbf3f02badbc3b5a02d3b835216163657d

  • SHA512

    76cbff51a8da7dce12d393afbc58d8e3d3687c6f521216da281ef04b566d7c9635f7de01d705abbb42d2de25bcd1ff0aebff1d92e545d93c1638de2ff815b0c6

  • SSDEEP

    12288:aMr3y90IuHVBxjrd6MU2lDTzeMfzenRvVldLh2Ep67eLnAOtm8iO2:JyPWBxjrd6MU2lvyMQpNRpieAO+

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Targets

    • Target

      8d71edc3f73c25cab8ef38eeaef8e1bbf3f02badbc3b5a02d3b835216163657d

    • Size

      680KB

    • MD5

      8f6ceca5f977b748ae52773f6ec95fcd

    • SHA1

      43a61b8ba738561a4a048ac239f0082a7b4e0795

    • SHA256

      8d71edc3f73c25cab8ef38eeaef8e1bbf3f02badbc3b5a02d3b835216163657d

    • SHA512

      76cbff51a8da7dce12d393afbc58d8e3d3687c6f521216da281ef04b566d7c9635f7de01d705abbb42d2de25bcd1ff0aebff1d92e545d93c1638de2ff815b0c6

    • SSDEEP

      12288:aMr3y90IuHVBxjrd6MU2lDTzeMfzenRvVldLh2Ep67eLnAOtm8iO2:JyPWBxjrd6MU2lvyMQpNRpieAO+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks