General

  • Target

    f2e71aa6592b015be506f0b168900798b1c1530fb246cbe51f138b7ae3108751

  • Size

    759KB

  • Sample

    241110-fm4bsazfjq

  • MD5

    948ec53b49e9c00c8cd24af5f7b97b3c

  • SHA1

    ee708548a62b3cd3332f107836227e28110038e7

  • SHA256

    f2e71aa6592b015be506f0b168900798b1c1530fb246cbe51f138b7ae3108751

  • SHA512

    fe53c56b581410885821d8527829447bdf0ab4fee7f7eedd20a375a5821840ebe276f7054518331ecf7adf09afdfcdf438c61c875915e5931d081dc134436106

  • SSDEEP

    12288:YMrZy90LRMNJ4b2OjNUZdN8veEFKwinONsEvnom4G6VS0AEoEOyr32+C:ByIMn4r5s6v3I4OuozbSXEDOGA

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      f2e71aa6592b015be506f0b168900798b1c1530fb246cbe51f138b7ae3108751

    • Size

      759KB

    • MD5

      948ec53b49e9c00c8cd24af5f7b97b3c

    • SHA1

      ee708548a62b3cd3332f107836227e28110038e7

    • SHA256

      f2e71aa6592b015be506f0b168900798b1c1530fb246cbe51f138b7ae3108751

    • SHA512

      fe53c56b581410885821d8527829447bdf0ab4fee7f7eedd20a375a5821840ebe276f7054518331ecf7adf09afdfcdf438c61c875915e5931d081dc134436106

    • SSDEEP

      12288:YMrZy90LRMNJ4b2OjNUZdN8veEFKwinONsEvnom4G6VS0AEoEOyr32+C:ByIMn4r5s6v3I4OuozbSXEDOGA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks