General

  • Target

    681b9cf7a6e30029cc599f0a546bc0c5e85e2aac602adbbedae2e01b3d477e82

  • Size

    585KB

  • Sample

    241111-amwdaaydpb

  • MD5

    3340f7758b69aba646261c0177544292

  • SHA1

    79d77ffa2668c444bb23547aca8d2740113275ab

  • SHA256

    681b9cf7a6e30029cc599f0a546bc0c5e85e2aac602adbbedae2e01b3d477e82

  • SHA512

    06e774ed404bef5aab9f762d426bcaeb9a4cecf9a99ef0acb2750d2e2db82168e18148736e7c4f272c2a3e9c86112a508181d96a9386df12ca6ee48eab34e1cf

  • SSDEEP

    12288:TMrmy90+OMb7sNtV8HiysMrS7GdAWHm0MiL1eOz42pxlX92:VydOqEDIiysMrHdD1/z4+lQ

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      681b9cf7a6e30029cc599f0a546bc0c5e85e2aac602adbbedae2e01b3d477e82

    • Size

      585KB

    • MD5

      3340f7758b69aba646261c0177544292

    • SHA1

      79d77ffa2668c444bb23547aca8d2740113275ab

    • SHA256

      681b9cf7a6e30029cc599f0a546bc0c5e85e2aac602adbbedae2e01b3d477e82

    • SHA512

      06e774ed404bef5aab9f762d426bcaeb9a4cecf9a99ef0acb2750d2e2db82168e18148736e7c4f272c2a3e9c86112a508181d96a9386df12ca6ee48eab34e1cf

    • SSDEEP

      12288:TMrmy90+OMb7sNtV8HiysMrS7GdAWHm0MiL1eOz42pxlX92:VydOqEDIiysMrHdD1/z4+lQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks