General

  • Target

    59608b11754753e003ed1a415f9ade6cce9f02dc0f2ec6c669a20452d611f075

  • Size

    440KB

  • Sample

    241111-ad7d7axmcy

  • MD5

    cd62f0249856bfeacd9560c17846cf75

  • SHA1

    4767b0f08c805ff5f3effc609e831ad85292947e

  • SHA256

    59608b11754753e003ed1a415f9ade6cce9f02dc0f2ec6c669a20452d611f075

  • SHA512

    2eee091b42153ee627e0d2e4ee84ffe2884431410494c335aae87a04e7ee888eb2be0bfe7007ddf844662e36ce2a6a3530034f2c6b763b95be58700e94fdbbb7

  • SSDEEP

    6144:KKy+bnr+ip0yN90QEAU4NCXbAkz/0su1digqs4ujd8ifiFVDsT2couGzJWXo2a8j:CMruy90yJNCUA/bU7wJiKNcIWvvj

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      59608b11754753e003ed1a415f9ade6cce9f02dc0f2ec6c669a20452d611f075

    • Size

      440KB

    • MD5

      cd62f0249856bfeacd9560c17846cf75

    • SHA1

      4767b0f08c805ff5f3effc609e831ad85292947e

    • SHA256

      59608b11754753e003ed1a415f9ade6cce9f02dc0f2ec6c669a20452d611f075

    • SHA512

      2eee091b42153ee627e0d2e4ee84ffe2884431410494c335aae87a04e7ee888eb2be0bfe7007ddf844662e36ce2a6a3530034f2c6b763b95be58700e94fdbbb7

    • SSDEEP

      6144:KKy+bnr+ip0yN90QEAU4NCXbAkz/0su1digqs4ujd8ifiFVDsT2couGzJWXo2a8j:CMruy90yJNCUA/bU7wJiKNcIWvvj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks