General

  • Target

    27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944.exe

  • Size

    539KB

  • Sample

    241110-yr51aathrh

  • MD5

    769fc5c0048329d9658539f21aaef663

  • SHA1

    315578fe18b240c903e96549d7483c891e959c45

  • SHA256

    27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944

  • SHA512

    a7c02b034e34f528e19aea66a496a471fad4c9f57f45a27fb295545a85590a31af19b5063974e04fe70652dcbd3a96968eaa0013e930e032981a577448120bfb

  • SSDEEP

    12288:bMrny90BmkZgQAJOBoKFqNhqNtPD6QyopnHcIQQKZ:0yNkZgQpGKVP+QXYQKZ

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944.exe

    • Size

      539KB

    • MD5

      769fc5c0048329d9658539f21aaef663

    • SHA1

      315578fe18b240c903e96549d7483c891e959c45

    • SHA256

      27972e883299dc4cc4d7ad1dd81f10cda98eb5fdec8c7f80d4aa53ec91240944

    • SHA512

      a7c02b034e34f528e19aea66a496a471fad4c9f57f45a27fb295545a85590a31af19b5063974e04fe70652dcbd3a96968eaa0013e930e032981a577448120bfb

    • SSDEEP

      12288:bMrny90BmkZgQAJOBoKFqNhqNtPD6QyopnHcIQQKZ:0yNkZgQpGKVP+QXYQKZ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks