General

  • Target

    bdeaecc7440e6402ea340813ab1c378bae16d324c1dcbcb574ecbe09f72db0cb

  • Size

    424KB

  • Sample

    241111-aa1gga1maj

  • MD5

    c5be0903e6761f2a5a9b81f23b9ea7f0

  • SHA1

    025e542cbb9287116c67300f0d6bd363debafe03

  • SHA256

    bdeaecc7440e6402ea340813ab1c378bae16d324c1dcbcb574ecbe09f72db0cb

  • SHA512

    c7f8fae538212855768dea9951a7d82ec0440b24a8515cebfef420d210128bbc04352794c35e33e2266962e9caa8923744a4ba5cac53611f72c5b18ec8e58218

  • SSDEEP

    12288:vMrMy90uBdaNvs59YKqmow0wTBEHmPSWZdDgsuOWB0:7yzBgNUUKqs8GPSidDgsW0

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      bdeaecc7440e6402ea340813ab1c378bae16d324c1dcbcb574ecbe09f72db0cb

    • Size

      424KB

    • MD5

      c5be0903e6761f2a5a9b81f23b9ea7f0

    • SHA1

      025e542cbb9287116c67300f0d6bd363debafe03

    • SHA256

      bdeaecc7440e6402ea340813ab1c378bae16d324c1dcbcb574ecbe09f72db0cb

    • SHA512

      c7f8fae538212855768dea9951a7d82ec0440b24a8515cebfef420d210128bbc04352794c35e33e2266962e9caa8923744a4ba5cac53611f72c5b18ec8e58218

    • SSDEEP

      12288:vMrMy90uBdaNvs59YKqmow0wTBEHmPSWZdDgsuOWB0:7yzBgNUUKqs8GPSidDgsW0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks