General

  • Target

    227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795

  • Size

    760KB

  • Sample

    241110-rexd2syapp

  • MD5

    a053dec1e6e9b434f07e00068834cbb7

  • SHA1

    c594130d116940f9b7682fc7f115db549ddc74de

  • SHA256

    227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795

  • SHA512

    c5ac47d4468bffd7cfe61a3ed156c3e5708a2385ed2c7e68c5f47dc4b48ea1e35662c5b531953e3b744d92573b543d32b6ca3ee8c08e38a27392fcbb9fd7c1d6

  • SSDEEP

    12288:VMrHy90VUJJmVpeNrrD9bwtHh2q9uGYPorPvCQKomnAtDYevBxhV96ZR633SATp+:aykYAVpKrv+TFCIPvCQKomsDDvBP36ZR

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795

    • Size

      760KB

    • MD5

      a053dec1e6e9b434f07e00068834cbb7

    • SHA1

      c594130d116940f9b7682fc7f115db549ddc74de

    • SHA256

      227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795

    • SHA512

      c5ac47d4468bffd7cfe61a3ed156c3e5708a2385ed2c7e68c5f47dc4b48ea1e35662c5b531953e3b744d92573b543d32b6ca3ee8c08e38a27392fcbb9fd7c1d6

    • SSDEEP

      12288:VMrHy90VUJJmVpeNrrD9bwtHh2q9uGYPorPvCQKomnAtDYevBxhV96ZR633SATp+:aykYAVpKrv+TFCIPvCQKomsDDvBP36ZR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks