General

  • Target

    e1296ace929372c53b9b28ece87e3284d194e8365c797010d496206f741f830d

  • Size

    742KB

  • Sample

    241110-jyedkswldn

  • MD5

    17271392ae491c286bf4ec7d1290cfae

  • SHA1

    70a13baa0c16c56641844c383b66e05baee417e6

  • SHA256

    e1296ace929372c53b9b28ece87e3284d194e8365c797010d496206f741f830d

  • SHA512

    91a9cf895901e8d97dc71df7a52d6bab1600ee26944fa469771774ff28b50f34b20834dca7b6776b96753846fc3a1330bcca52050d6dd2f5ec7323e3964bee2a

  • SSDEEP

    12288:4Mrvy90h1DfGDDU/w2sSmQux4nxJS9jgoH9mnayVw3qgtuiOf52R1N:nyk1DfGU9sjyxA9codPyVwbsf5Wn

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Targets

    • Target

      e1296ace929372c53b9b28ece87e3284d194e8365c797010d496206f741f830d

    • Size

      742KB

    • MD5

      17271392ae491c286bf4ec7d1290cfae

    • SHA1

      70a13baa0c16c56641844c383b66e05baee417e6

    • SHA256

      e1296ace929372c53b9b28ece87e3284d194e8365c797010d496206f741f830d

    • SHA512

      91a9cf895901e8d97dc71df7a52d6bab1600ee26944fa469771774ff28b50f34b20834dca7b6776b96753846fc3a1330bcca52050d6dd2f5ec7323e3964bee2a

    • SSDEEP

      12288:4Mrvy90h1DfGDDU/w2sSmQux4nxJS9jgoH9mnayVw3qgtuiOf52R1N:nyk1DfGU9sjyxA9codPyVwbsf5Wn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks