General

  • Target

    7aad500d7c5d1781b8d5a3e32df6c96c959bfc728e7b6e927a9497da3b468584

  • Size

    391KB

  • Sample

    241110-3sg23axkcs

  • MD5

    fa20713e6ae1477d70b465a02baac8b8

  • SHA1

    d39a67a6fd627ed1601b1cef02ce138bf86d0bea

  • SHA256

    7aad500d7c5d1781b8d5a3e32df6c96c959bfc728e7b6e927a9497da3b468584

  • SHA512

    eaef181c80c33cdb168f5d9c802c1946bf59b2405a4ddffe9d62a9d67f205cc923be45c8f58f8703806f7ad749f8ebbf31d37af1f44505fe002af9f3e3585dd5

  • SSDEEP

    12288:hRZAKiTH7VnqXqzRDLQHdnap9MGXJyqf1C5:h2HNqaNDL2nDYM

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      0ddc35d5e2b8bc99662d9b23f287fdec361d5b2f1e266c9983e270dcf2ca59ef.exe

    • Size

      442KB

    • MD5

      bf4c3ac8ae8c120abe1da292516db31a

    • SHA1

      f573d3050e27fc3e80ffe45ab1d04a5414c6c671

    • SHA256

      0ddc35d5e2b8bc99662d9b23f287fdec361d5b2f1e266c9983e270dcf2ca59ef

    • SHA512

      2ef5bb08321a492b11becc2c18be2d041cc712c8e868b4d48b14bfcd0e334200bb642ee78ac1b1ff425d857ead0e2591b6e9934a2ac4ca6cffcae7f8ad1177a7

    • SSDEEP

      6144:KVy+bnr+fp0yN90QEGYNAIwIxpdfMQmVtgKZw8KDWClmo3AIoKEiBwajoKSB6ug2:/MrHy90cYvwOKVpKDWU3ZAKSeAB40d

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks