General

  • Target

    3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf

  • Size

    583KB

  • Sample

    241111-agtbqs1nbm

  • MD5

    391519caabff32f6aecf1332a3c799a9

  • SHA1

    5da5530fe60ce0fdea1fbf694ece966afc330e97

  • SHA256

    3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf

  • SHA512

    3539ed3feaeeb53d8de2c2cd2d0da3261e02727de735b87270a3e4f83d650758fcea7622819c3bd05429d0c0b638ab2b3c186bb60613e773c0e77dbb38d870cf

  • SSDEEP

    12288:YMrgy903yDIZ8VrySr0c3N5iz91GajAJ3jhjoljbsU:oyG8IOV2+3riz91hi3jhKjN

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Targets

    • Target

      3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf

    • Size

      583KB

    • MD5

      391519caabff32f6aecf1332a3c799a9

    • SHA1

      5da5530fe60ce0fdea1fbf694ece966afc330e97

    • SHA256

      3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf

    • SHA512

      3539ed3feaeeb53d8de2c2cd2d0da3261e02727de735b87270a3e4f83d650758fcea7622819c3bd05429d0c0b638ab2b3c186bb60613e773c0e77dbb38d870cf

    • SSDEEP

      12288:YMrgy903yDIZ8VrySr0c3N5iz91GajAJ3jhjoljbsU:oyG8IOV2+3riz91hi3jhKjN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks