General

  • Target

    d5b24d09b54abf36367e733abb4f26d9bd8b0770497e5376b1046b6b96df7e13

  • Size

    439KB

  • Sample

    241110-zzphyavlaw

  • MD5

    d8b413ee35cbbd2f230007e01ab534c8

  • SHA1

    309509baa753f524e35131e1b53b3dced9e1653f

  • SHA256

    d5b24d09b54abf36367e733abb4f26d9bd8b0770497e5376b1046b6b96df7e13

  • SHA512

    914eb46c09ac2f8c66797f27b3e465e96bbc210a5fe9b4d918643fe5cdbc75326cb224943c6851fc62a606db4a62ac4fda2dfb03b3da1ee2e6d01191102ce1b6

  • SSDEEP

    6144:Kdy+bnr+Zp0yN90QEPVRHb2pKwF0fJmHHXWtYw22gzypGwYjLsLQMXRgbX:TMr1y90Bb70FWmHHm2nBzypG3m2

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      d5b24d09b54abf36367e733abb4f26d9bd8b0770497e5376b1046b6b96df7e13

    • Size

      439KB

    • MD5

      d8b413ee35cbbd2f230007e01ab534c8

    • SHA1

      309509baa753f524e35131e1b53b3dced9e1653f

    • SHA256

      d5b24d09b54abf36367e733abb4f26d9bd8b0770497e5376b1046b6b96df7e13

    • SHA512

      914eb46c09ac2f8c66797f27b3e465e96bbc210a5fe9b4d918643fe5cdbc75326cb224943c6851fc62a606db4a62ac4fda2dfb03b3da1ee2e6d01191102ce1b6

    • SSDEEP

      6144:Kdy+bnr+Zp0yN90QEPVRHb2pKwF0fJmHHXWtYw22gzypGwYjLsLQMXRgbX:TMr1y90Bb70FWmHHm2nBzypG3m2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks