General

  • Target

    2f77a3892122b1423de08eaadf5eeeae68a2dbcdba3505b312efaa2d0f327c3e

  • Size

    765KB

  • Sample

    241110-3nxa7a1jcj

  • MD5

    92ee6bacae28ea0b0513f0fc428d1042

  • SHA1

    a73e9e9a3c269c9782e9137723e3616135a765f2

  • SHA256

    2f77a3892122b1423de08eaadf5eeeae68a2dbcdba3505b312efaa2d0f327c3e

  • SHA512

    8bc818b86fed9104b2f4af561eed468a6382562c307a988b9c4c24bf3a1450276ff62ce1f60c4e5a0809c6037b5aeafe0beecfa222200fbc549ca6dfe609955e

  • SSDEEP

    12288:DMrBy909Ubc79S0/RIAmVqKPL0bRdDVGWJGAdCJ0g6jEOo5/ySPOx:OyTbchS0/mA0Y7DVGqCxkE15/5q

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      2f77a3892122b1423de08eaadf5eeeae68a2dbcdba3505b312efaa2d0f327c3e

    • Size

      765KB

    • MD5

      92ee6bacae28ea0b0513f0fc428d1042

    • SHA1

      a73e9e9a3c269c9782e9137723e3616135a765f2

    • SHA256

      2f77a3892122b1423de08eaadf5eeeae68a2dbcdba3505b312efaa2d0f327c3e

    • SHA512

      8bc818b86fed9104b2f4af561eed468a6382562c307a988b9c4c24bf3a1450276ff62ce1f60c4e5a0809c6037b5aeafe0beecfa222200fbc549ca6dfe609955e

    • SSDEEP

      12288:DMrBy909Ubc79S0/RIAmVqKPL0bRdDVGWJGAdCJ0g6jEOo5/ySPOx:OyTbchS0/mA0Y7DVGqCxkE15/5q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks