General

  • Target

    dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d

  • Size

    760KB

  • Sample

    241110-zs8cgavjgw

  • MD5

    57f6231b519552d31b66c55faf263053

  • SHA1

    20be74bdea71d56de0595e93ab6e870ca8aff2d6

  • SHA256

    dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d

  • SHA512

    ef495d39607376295d71b52b7a70b155ec1d1fa6dc4d54638293a9b4d0381cc99cc02964321b7c9cafd1b7e197c41e48c101e089dd73981401dfc75fc7432a2c

  • SSDEEP

    12288:uMrfy90JINSKI44cT7jVn1+aLznZe4KBQ9IAymn8wDYevZ43V9MZR6XnES:ByXW4tDV1ZZCBQ9IAymFDDvZq3MZRInL

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d

    • Size

      760KB

    • MD5

      57f6231b519552d31b66c55faf263053

    • SHA1

      20be74bdea71d56de0595e93ab6e870ca8aff2d6

    • SHA256

      dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d

    • SHA512

      ef495d39607376295d71b52b7a70b155ec1d1fa6dc4d54638293a9b4d0381cc99cc02964321b7c9cafd1b7e197c41e48c101e089dd73981401dfc75fc7432a2c

    • SSDEEP

      12288:uMrfy90JINSKI44cT7jVn1+aLznZe4KBQ9IAymn8wDYevZ43V9MZR6XnES:ByXW4tDV1ZZCBQ9IAymFDDvZq3MZRInL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks