General

  • Target

    f1b2b27fb8f1bce58f2e3caa33879b98140c497f5a9ff4c79274843c3a772a54

  • Size

    424KB

  • Sample

    241111-at49rsyeqg

  • MD5

    5566f1dfa05c2d26ec0780e856fd2ae0

  • SHA1

    4bbb06421f79ada975dbb468375221bd31c1eece

  • SHA256

    f1b2b27fb8f1bce58f2e3caa33879b98140c497f5a9ff4c79274843c3a772a54

  • SHA512

    1e427d32c6e50d3fede7b2e4e285985e39977d2946a52846c50d5908960590d2e3c1718d497340e6bd5751c9f2b5794dd0ef4ac109e70d0da67ed1f8c9bce69d

  • SSDEEP

    12288:OMrYy90NBdaNvs59YKqmow0wTBEHmPSWZdDgsuOWBl:6ykBgNUUKqs8GPSidDgsWl

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      f1b2b27fb8f1bce58f2e3caa33879b98140c497f5a9ff4c79274843c3a772a54

    • Size

      424KB

    • MD5

      5566f1dfa05c2d26ec0780e856fd2ae0

    • SHA1

      4bbb06421f79ada975dbb468375221bd31c1eece

    • SHA256

      f1b2b27fb8f1bce58f2e3caa33879b98140c497f5a9ff4c79274843c3a772a54

    • SHA512

      1e427d32c6e50d3fede7b2e4e285985e39977d2946a52846c50d5908960590d2e3c1718d497340e6bd5751c9f2b5794dd0ef4ac109e70d0da67ed1f8c9bce69d

    • SSDEEP

      12288:OMrYy90NBdaNvs59YKqmow0wTBEHmPSWZdDgsuOWBl:6ykBgNUUKqs8GPSidDgsWl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks