General

  • Target

    c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105

  • Size

    583KB

  • Sample

    241110-3khcvsxgkg

  • MD5

    8d5ce5dbe1741ee8e955541f92ac3be5

  • SHA1

    b4365d048f5be355a41537824c72b077b5a1d60d

  • SHA256

    c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105

  • SHA512

    97c5f2cafc77e3ce4b4d0099530f66cb1c4e617c8419ec3e2fdd9e18b946826741ee0fa97f413969b62f232d23a319b68b06a02f87f58ef61fa16aa9f0276678

  • SSDEEP

    12288:+Mr6y900KnIV/JQX378bIvxIc3Nq5H915qLD0ovQEprI1:My1VBQ78MvD3Y5H9152Djpc1

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Targets

    • Target

      c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105

    • Size

      583KB

    • MD5

      8d5ce5dbe1741ee8e955541f92ac3be5

    • SHA1

      b4365d048f5be355a41537824c72b077b5a1d60d

    • SHA256

      c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105

    • SHA512

      97c5f2cafc77e3ce4b4d0099530f66cb1c4e617c8419ec3e2fdd9e18b946826741ee0fa97f413969b62f232d23a319b68b06a02f87f58ef61fa16aa9f0276678

    • SSDEEP

      12288:+Mr6y900KnIV/JQX378bIvxIc3Nq5H915qLD0ovQEprI1:My1VBQ78MvD3Y5H9152Djpc1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks