General

  • Target

    7fe1f05024c4173bbc996a4bfb2076f81e0820d4ffcc5c6d2dd313a82366dbd0

  • Size

    766KB

  • Sample

    241110-k6ql9axjhl

  • MD5

    f717a2c5b8fd05bcf478eb31060acaf1

  • SHA1

    8a63efe84f84dbc0e70e6fb8db01618745a256e3

  • SHA256

    7fe1f05024c4173bbc996a4bfb2076f81e0820d4ffcc5c6d2dd313a82366dbd0

  • SHA512

    442fe7cafd0cb4877d8f6ea116359f303289bc6d4f9a77b36b814bc9442abf041207bbad8dc0c753bc38870c8c1d0accc70263aa0837a9ec3ff423d53904ccc8

  • SSDEEP

    12288:eMrfy901WY6HWmf1UseONw4WHMriCs7+a40n7MUbIHo0y3g4/LDNCTq6/g0Eeuwd:xyIWvHWmf1Uf4WHXCs7+al4ojwmZCTqm

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      7fe1f05024c4173bbc996a4bfb2076f81e0820d4ffcc5c6d2dd313a82366dbd0

    • Size

      766KB

    • MD5

      f717a2c5b8fd05bcf478eb31060acaf1

    • SHA1

      8a63efe84f84dbc0e70e6fb8db01618745a256e3

    • SHA256

      7fe1f05024c4173bbc996a4bfb2076f81e0820d4ffcc5c6d2dd313a82366dbd0

    • SHA512

      442fe7cafd0cb4877d8f6ea116359f303289bc6d4f9a77b36b814bc9442abf041207bbad8dc0c753bc38870c8c1d0accc70263aa0837a9ec3ff423d53904ccc8

    • SSDEEP

      12288:eMrfy901WY6HWmf1UseONw4WHMriCs7+a40n7MUbIHo0y3g4/LDNCTq6/g0Eeuwd:xyIWvHWmf1Uf4WHXCs7+al4ojwmZCTqm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks