General

  • Target

    33df9dacdf9fa1bf8ac66aca2abc3e98bff6fe72dcc71b2db40921c5401d7e36

  • Size

    665KB

  • Sample

    241110-z6qpksvgkn

  • MD5

    1f045515293b36f34c83928c43cdbd13

  • SHA1

    1def80cb8549f24f4687e6b6a9a4fe9311f02f0a

  • SHA256

    33df9dacdf9fa1bf8ac66aca2abc3e98bff6fe72dcc71b2db40921c5401d7e36

  • SHA512

    1cc4e59aea3344bcae41f522dc56b3a045841bae457311010ca0e9e02b4bedd0492a268f8313ec25cfb4cb7a13c8b674fb1eb0b392579252307f82eee79a5218

  • SSDEEP

    12288:SMrhy90Xd+V5/DicSRFPkjq9zj4v5qbZn4TdxLMse+L8TD+MD4:HyNVTSARvYNnQXeUjM8

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      33df9dacdf9fa1bf8ac66aca2abc3e98bff6fe72dcc71b2db40921c5401d7e36

    • Size

      665KB

    • MD5

      1f045515293b36f34c83928c43cdbd13

    • SHA1

      1def80cb8549f24f4687e6b6a9a4fe9311f02f0a

    • SHA256

      33df9dacdf9fa1bf8ac66aca2abc3e98bff6fe72dcc71b2db40921c5401d7e36

    • SHA512

      1cc4e59aea3344bcae41f522dc56b3a045841bae457311010ca0e9e02b4bedd0492a268f8313ec25cfb4cb7a13c8b674fb1eb0b392579252307f82eee79a5218

    • SSDEEP

      12288:SMrhy90Xd+V5/DicSRFPkjq9zj4v5qbZn4TdxLMse+L8TD+MD4:HyNVTSARvYNnQXeUjM8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks