General

  • Target

    0e454203556113405f061c9b66c8553c14d7bbfd2cb6d902cc99fc02545222ec

  • Size

    433KB

  • Sample

    241110-z9bptsvmgw

  • MD5

    4c0ab2bbfef4c3dd4034268d413087b9

  • SHA1

    f1ea72ab1bb05d7c840df2f72c18b002c82cf4d4

  • SHA256

    0e454203556113405f061c9b66c8553c14d7bbfd2cb6d902cc99fc02545222ec

  • SHA512

    65a2b41e695cb7db5f8b5aeb9ba475b0a7b0f0f53a4341d9a0715f3b3244ffff6023e48f33d74296c7b8bbcf266ceec7a8729dbfca85db7c59db42b4d4c32ea1

  • SSDEEP

    6144:K8y+bnr+Hp0yN90QESb0ZkVFIhHvxg6SdVljJbjT+KMAEBovy6GWOIUq0nd4:gMrny9084iSvxgb3l9VXE+vbGfhqs4

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      0e454203556113405f061c9b66c8553c14d7bbfd2cb6d902cc99fc02545222ec

    • Size

      433KB

    • MD5

      4c0ab2bbfef4c3dd4034268d413087b9

    • SHA1

      f1ea72ab1bb05d7c840df2f72c18b002c82cf4d4

    • SHA256

      0e454203556113405f061c9b66c8553c14d7bbfd2cb6d902cc99fc02545222ec

    • SHA512

      65a2b41e695cb7db5f8b5aeb9ba475b0a7b0f0f53a4341d9a0715f3b3244ffff6023e48f33d74296c7b8bbcf266ceec7a8729dbfca85db7c59db42b4d4c32ea1

    • SSDEEP

      6144:K8y+bnr+Hp0yN90QESb0ZkVFIhHvxg6SdVljJbjT+KMAEBovy6GWOIUq0nd4:gMrny9084iSvxgb3l9VXE+vbGfhqs4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks