General

  • Target

    481dce5d101ddbec26a8d594ee1a4f635956c2a18680c353fa3f3d4655ad8a27

  • Size

    439KB

  • Sample

    241110-3hlx9swrct

  • MD5

    c1ff118af2a79bae523124a3ec48b1fc

  • SHA1

    75f0bac7c30ff6e8a0ecb899da2e55b96a6ebdbc

  • SHA256

    481dce5d101ddbec26a8d594ee1a4f635956c2a18680c353fa3f3d4655ad8a27

  • SHA512

    88b9c696221e856b188a39ea68c9abfac9eec3c1d43dc810edf4f59fa33f6f13105a27ceb920661bc3d1d2f27e3eeff1f6102b557bc9552e35620cfa39b2875b

  • SSDEEP

    12288:LMrhy908pUnN2DsOB95snOV7QqlO5SGLOr:GyPUcszOV7QsISGar

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      481dce5d101ddbec26a8d594ee1a4f635956c2a18680c353fa3f3d4655ad8a27

    • Size

      439KB

    • MD5

      c1ff118af2a79bae523124a3ec48b1fc

    • SHA1

      75f0bac7c30ff6e8a0ecb899da2e55b96a6ebdbc

    • SHA256

      481dce5d101ddbec26a8d594ee1a4f635956c2a18680c353fa3f3d4655ad8a27

    • SHA512

      88b9c696221e856b188a39ea68c9abfac9eec3c1d43dc810edf4f59fa33f6f13105a27ceb920661bc3d1d2f27e3eeff1f6102b557bc9552e35620cfa39b2875b

    • SSDEEP

      12288:LMrhy908pUnN2DsOB95snOV7QqlO5SGLOr:GyPUcszOV7QsISGar

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks