General

  • Target

    8249b4cad2f8a2b20f63b207f2bba84184b7f4b3571a63d0333bf571596322dd

  • Size

    442KB

  • Sample

    241110-zzbbbaykfm

  • MD5

    c3ef9ce9f6e3b2ccbe9b5053ef90d57f

  • SHA1

    b5d836be2f4e0c8ffc5644b3443ae348759bc7ce

  • SHA256

    8249b4cad2f8a2b20f63b207f2bba84184b7f4b3571a63d0333bf571596322dd

  • SHA512

    f249be573fa0d974a2c1f019f4b1d3fb8c749406fc4b44d39100c5bffa88bbb9b2f2e1cf528eecf42269e0a7e7c3c2fa6f0498787a412e5ab7652b8d06aa09bd

  • SSDEEP

    6144:K7y+bnr++p0yN90QEkBEyWzP8Hao4s+9V6odP5B/d34Rbs949p64q14x9wq:dMr6y90e2yQIao4r6opPiRs94S4q1O9

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      8249b4cad2f8a2b20f63b207f2bba84184b7f4b3571a63d0333bf571596322dd

    • Size

      442KB

    • MD5

      c3ef9ce9f6e3b2ccbe9b5053ef90d57f

    • SHA1

      b5d836be2f4e0c8ffc5644b3443ae348759bc7ce

    • SHA256

      8249b4cad2f8a2b20f63b207f2bba84184b7f4b3571a63d0333bf571596322dd

    • SHA512

      f249be573fa0d974a2c1f019f4b1d3fb8c749406fc4b44d39100c5bffa88bbb9b2f2e1cf528eecf42269e0a7e7c3c2fa6f0498787a412e5ab7652b8d06aa09bd

    • SSDEEP

      6144:K7y+bnr++p0yN90QEkBEyWzP8Hao4s+9V6odP5B/d34Rbs949p64q14x9wq:dMr6y90e2yQIao4r6opPiRs94S4q1O9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks