General

  • Target

    682d8b62bc3f2cf6d1e31dd1ca29317ecb4251b2a45812a6c3f792639c3f613e

  • Size

    770KB

  • Sample

    241110-bcsebaynek

  • MD5

    76e42f5a56fb31264d7aca7a6902e88e

  • SHA1

    ac865691b6c5a2b3f9e80e40c7d74ec8205a88a5

  • SHA256

    682d8b62bc3f2cf6d1e31dd1ca29317ecb4251b2a45812a6c3f792639c3f613e

  • SHA512

    73ec92573179ed5d1438655764c589a743536aacfe60dfce3f9578813c826dd2cae4531eac2bef614a8065b191f558dea585b0bbc13cd475d5c65167d32a379c

  • SSDEEP

    12288:SMrXy90e9o7Cb7eA89MG3YMTNsbDzlQg+8hr9oqN4qv5JkFrODlvnhT5uayG:FyD9oem9M8TybHzGqyk5er0PhThyG

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      682d8b62bc3f2cf6d1e31dd1ca29317ecb4251b2a45812a6c3f792639c3f613e

    • Size

      770KB

    • MD5

      76e42f5a56fb31264d7aca7a6902e88e

    • SHA1

      ac865691b6c5a2b3f9e80e40c7d74ec8205a88a5

    • SHA256

      682d8b62bc3f2cf6d1e31dd1ca29317ecb4251b2a45812a6c3f792639c3f613e

    • SHA512

      73ec92573179ed5d1438655764c589a743536aacfe60dfce3f9578813c826dd2cae4531eac2bef614a8065b191f558dea585b0bbc13cd475d5c65167d32a379c

    • SSDEEP

      12288:SMrXy90e9o7Cb7eA89MG3YMTNsbDzlQg+8hr9oqN4qv5JkFrODlvnhT5uayG:FyD9oem9M8TybHzGqyk5er0PhThyG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks