General

  • Target

    99bd2a1f8477ba80bb381f8c0677e620fad0006d30cc784b45a4e9bdd6d66bcd

  • Size

    565KB

  • Sample

    241111-ah9ecayakj

  • MD5

    ad3baea5d9179c29128bf851213c9c0a

  • SHA1

    455f012b8f7c71d1d9614d27918be35c42c7916b

  • SHA256

    99bd2a1f8477ba80bb381f8c0677e620fad0006d30cc784b45a4e9bdd6d66bcd

  • SHA512

    c9c9df7da5aeda323f46f403ea4aa02869a268ffe76567c7df3c054e2edce6ec24f758d0aa4c9c3bb49e86a7ac9e82a33f87439b902e57b9af7ddd2315a5600a

  • SSDEEP

    12288:tMrxy902+nf02/T7QVAbZxc2K7pb80fmvxTMFzX2Ts7Mm:Qyh+nf00T7QYZA7pb80fmZTMFzXVj

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      99bd2a1f8477ba80bb381f8c0677e620fad0006d30cc784b45a4e9bdd6d66bcd

    • Size

      565KB

    • MD5

      ad3baea5d9179c29128bf851213c9c0a

    • SHA1

      455f012b8f7c71d1d9614d27918be35c42c7916b

    • SHA256

      99bd2a1f8477ba80bb381f8c0677e620fad0006d30cc784b45a4e9bdd6d66bcd

    • SHA512

      c9c9df7da5aeda323f46f403ea4aa02869a268ffe76567c7df3c054e2edce6ec24f758d0aa4c9c3bb49e86a7ac9e82a33f87439b902e57b9af7ddd2315a5600a

    • SSDEEP

      12288:tMrxy902+nf02/T7QVAbZxc2K7pb80fmvxTMFzX2Ts7Mm:Qyh+nf00T7QYZA7pb80fmZTMFzXVj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks