General

  • Target

    176fe315f0a20bf029b56934e5f7bef9c0f93f37a46f6db369fe9d56d0b32176N

  • Size

    733KB

  • Sample

    241111-3n66dsspen

  • MD5

    543e695a6c46702e5d0edef1ec797230

  • SHA1

    a9352c1779066038fc5143d498eba0ecc0598fcf

  • SHA256

    176fe315f0a20bf029b56934e5f7bef9c0f93f37a46f6db369fe9d56d0b32176

  • SHA512

    7c59100c9f7d8b2151ea460ebcc2ac83ef6852c53d91cbe97f60d4543598f1c4bce07bdab24e15fbf351f5e9e9f8c6f0d01f7e2d32b188e0c1ba592d88e2ac73

  • SSDEEP

    12288:NMrKy90WGUha0TiyFqnaUW8DSV6VRVs7Nq9Xgyf6vZ7gtVjCH1TSNGDF0g/6M0rz:jyxa0TtqnHXDSV6xsI9Xgb9gfCVTSUnW

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      176fe315f0a20bf029b56934e5f7bef9c0f93f37a46f6db369fe9d56d0b32176N

    • Size

      733KB

    • MD5

      543e695a6c46702e5d0edef1ec797230

    • SHA1

      a9352c1779066038fc5143d498eba0ecc0598fcf

    • SHA256

      176fe315f0a20bf029b56934e5f7bef9c0f93f37a46f6db369fe9d56d0b32176

    • SHA512

      7c59100c9f7d8b2151ea460ebcc2ac83ef6852c53d91cbe97f60d4543598f1c4bce07bdab24e15fbf351f5e9e9f8c6f0d01f7e2d32b188e0c1ba592d88e2ac73

    • SSDEEP

      12288:NMrKy90WGUha0TiyFqnaUW8DSV6VRVs7Nq9Xgyf6vZ7gtVjCH1TSNGDF0g/6M0rz:jyxa0TtqnHXDSV6xsI9Xgb9gfCVTSUnW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks