General

  • Target

    f2d5e7568c613d974fad64e075cd03e0d28778bd37634152c8d6f1247c394c21

  • Size

    760KB

  • Sample

    241110-3w34psyame

  • MD5

    4817d69fd23bd00edbc2db13f8566c8d

  • SHA1

    2a0129cbe5955086953a3aae49d91ab374c20e07

  • SHA256

    f2d5e7568c613d974fad64e075cd03e0d28778bd37634152c8d6f1247c394c21

  • SHA512

    71adb15c3da08ffe0863305eaaf08e0cb634e132d000ff904fc6fee906a51f32b214d711172e0b932f57f0d4a389cc9a4875ba9cf9778a7accaf6989e6a97dc2

  • SSDEEP

    12288:JMr7y90y05piCxLWH0a7rRt7d2pE70u5mnQEDYevSGNV9SZR6IpEfbi:qyzApiCLWH0Af4pE70u5mNDDvS23SZR7

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      f2d5e7568c613d974fad64e075cd03e0d28778bd37634152c8d6f1247c394c21

    • Size

      760KB

    • MD5

      4817d69fd23bd00edbc2db13f8566c8d

    • SHA1

      2a0129cbe5955086953a3aae49d91ab374c20e07

    • SHA256

      f2d5e7568c613d974fad64e075cd03e0d28778bd37634152c8d6f1247c394c21

    • SHA512

      71adb15c3da08ffe0863305eaaf08e0cb634e132d000ff904fc6fee906a51f32b214d711172e0b932f57f0d4a389cc9a4875ba9cf9778a7accaf6989e6a97dc2

    • SSDEEP

      12288:JMr7y90y05piCxLWH0a7rRt7d2pE70u5mnQEDYevSGNV9SZR6IpEfbi:qyzApiCLWH0Af4pE70u5mNDDvS23SZR7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks