General

  • Target

    7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38

  • Size

    570KB

  • Sample

    241111-b11qlazelb

  • MD5

    4a1b055750bde84fecd3e19ecd3b0076

  • SHA1

    18cd0e3279bf35c79b0cfa73196649f04a219619

  • SHA256

    7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38

  • SHA512

    366cf0f8101940e07dd25d7a35676275e7f6c09831fcebf508e77a1927fe2ffca95349d88b96e2a335230e2eea98fe11ba375a88bd6f35c0adf7c0416eaf42c5

  • SSDEEP

    12288:zMrLy90pYMhg1SDJvInR4oZQqGStRRpVC2VSiZTfsE:ky+ndtQR4oZQYfiqBZ7l

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Targets

    • Target

      7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38

    • Size

      570KB

    • MD5

      4a1b055750bde84fecd3e19ecd3b0076

    • SHA1

      18cd0e3279bf35c79b0cfa73196649f04a219619

    • SHA256

      7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38

    • SHA512

      366cf0f8101940e07dd25d7a35676275e7f6c09831fcebf508e77a1927fe2ffca95349d88b96e2a335230e2eea98fe11ba375a88bd6f35c0adf7c0416eaf42c5

    • SSDEEP

      12288:zMrLy90pYMhg1SDJvInR4oZQqGStRRpVC2VSiZTfsE:ky+ndtQR4oZQYfiqBZ7l

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks