General

  • Target

    54e7966bc2ed3fd91c6c62881c3efdb53b7f417661d45eef8cc3a789c6b69e43

  • Size

    440KB

  • Sample

    241111-a3gj3ayglh

  • MD5

    d5935649a783936ef05cebdf7792b1b3

  • SHA1

    f353114f8ca5775f7e2244f1da0d608455f761a6

  • SHA256

    54e7966bc2ed3fd91c6c62881c3efdb53b7f417661d45eef8cc3a789c6b69e43

  • SHA512

    d8e482b7cd3c606d4717d89f90515d2c495d4c9fc2d128d4e8e4c333a4ae4f8c805791254cd6ba6c0fa0b55932e925c93bc1b2589b8ebf63cf9c26783d07d0db

  • SSDEEP

    12288:IMrYy90I9yZbmga3v2210xZA4XBbouCjChkym:AyP9wOgVX9oa5m

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      54e7966bc2ed3fd91c6c62881c3efdb53b7f417661d45eef8cc3a789c6b69e43

    • Size

      440KB

    • MD5

      d5935649a783936ef05cebdf7792b1b3

    • SHA1

      f353114f8ca5775f7e2244f1da0d608455f761a6

    • SHA256

      54e7966bc2ed3fd91c6c62881c3efdb53b7f417661d45eef8cc3a789c6b69e43

    • SHA512

      d8e482b7cd3c606d4717d89f90515d2c495d4c9fc2d128d4e8e4c333a4ae4f8c805791254cd6ba6c0fa0b55932e925c93bc1b2589b8ebf63cf9c26783d07d0db

    • SSDEEP

      12288:IMrYy90I9yZbmga3v2210xZA4XBbouCjChkym:AyP9wOgVX9oa5m

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks