General

  • Target

    74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4

  • Size

    765KB

  • Sample

    241110-n6tkpawhjc

  • MD5

    992e0f4911ea5b5b199072cf84bb735a

  • SHA1

    cc9967dbf12f54305088b4ba5aea6f6c264d193d

  • SHA256

    74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4

  • SHA512

    3626d69c05aa40f0efc310dbf548df98fd9059ec28baffd738bd5a35e2e7b2098b164a87acf09a0ef2f9280f423910cc025e22f9c15901715efb39dbfbee7cf3

  • SSDEEP

    12288:gMray90BXz5ZV6y3exQeVREe+ULZvAqw0Gl8PyRGh6W5kTvtRe0/mABbsk9AztQC:KyuzbVHexLJnLZ9Gu0Ghcv+0ugsk9KWm

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4

    • Size

      765KB

    • MD5

      992e0f4911ea5b5b199072cf84bb735a

    • SHA1

      cc9967dbf12f54305088b4ba5aea6f6c264d193d

    • SHA256

      74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4

    • SHA512

      3626d69c05aa40f0efc310dbf548df98fd9059ec28baffd738bd5a35e2e7b2098b164a87acf09a0ef2f9280f423910cc025e22f9c15901715efb39dbfbee7cf3

    • SSDEEP

      12288:gMray90BXz5ZV6y3exQeVREe+ULZvAqw0Gl8PyRGh6W5kTvtRe0/mABbsk9AztQC:KyuzbVHexLJnLZ9Gu0Ghcv+0ugsk9KWm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks