General

  • Target

    79a12521601d272265908cced12a8f5fa8da55f9400654a720e3778fe3f7d88f

  • Size

    429KB

  • Sample

    241110-3xd6zaxlaw

  • MD5

    8d55487bac1480c524536b42420604e2

  • SHA1

    900ae74d80d19a6ab8d53e52f4f1aa592dc37b65

  • SHA256

    79a12521601d272265908cced12a8f5fa8da55f9400654a720e3778fe3f7d88f

  • SHA512

    55ae812396ae5cea968242b469550308f8924a0103297bf0d244a11eac26b51961c9a2bb8c3cc80cb83e8b6cf3ba970d653045bd9091359fcda4cc322fb595cb

  • SSDEEP

    6144:KNy+bnr+6p0yN90QELhZYwU21MEImBW5ZMUT/RIamEBeI2puLOPZxsn0cuthEn:/Mrmy90vZS2iEImKT/kEBe+LOvNtw

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      79a12521601d272265908cced12a8f5fa8da55f9400654a720e3778fe3f7d88f

    • Size

      429KB

    • MD5

      8d55487bac1480c524536b42420604e2

    • SHA1

      900ae74d80d19a6ab8d53e52f4f1aa592dc37b65

    • SHA256

      79a12521601d272265908cced12a8f5fa8da55f9400654a720e3778fe3f7d88f

    • SHA512

      55ae812396ae5cea968242b469550308f8924a0103297bf0d244a11eac26b51961c9a2bb8c3cc80cb83e8b6cf3ba970d653045bd9091359fcda4cc322fb595cb

    • SSDEEP

      6144:KNy+bnr+6p0yN90QELhZYwU21MEImBW5ZMUT/RIamEBeI2puLOPZxsn0cuthEn:/Mrmy90vZS2iEImKT/kEBe+LOvNtw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks