General

  • Target

    c47bebf4c74351d5912ce5b12593e57e326d1bbb5aa67896ab931561a1b22846

  • Size

    440KB

  • Sample

    241111-c21mnatqam

  • MD5

    5890974fc8babf4b44853e1be380c6f9

  • SHA1

    d332ab7bc0a6fdfff4e4d89dfbcdd2c56afaf405

  • SHA256

    c47bebf4c74351d5912ce5b12593e57e326d1bbb5aa67896ab931561a1b22846

  • SHA512

    14ee12f4c6c53ee0cd3d4e18ce7bb981fda6abd86d9d2ce9b8ea9d82b5d96defb6352d57fc611c81c0485e3179b7c76637de6d70fa254d3120934ee0bcd0d944

  • SSDEEP

    6144:KHy+bnr+sp0yN90QEKY2GJKdWoUQo9QCMBzH7NwFYRobY2aWFhUXV+feNfN8/Ju+:ZMrgy90MVPFoJ6fNwvvIXVdz8/J5hr

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      c47bebf4c74351d5912ce5b12593e57e326d1bbb5aa67896ab931561a1b22846

    • Size

      440KB

    • MD5

      5890974fc8babf4b44853e1be380c6f9

    • SHA1

      d332ab7bc0a6fdfff4e4d89dfbcdd2c56afaf405

    • SHA256

      c47bebf4c74351d5912ce5b12593e57e326d1bbb5aa67896ab931561a1b22846

    • SHA512

      14ee12f4c6c53ee0cd3d4e18ce7bb981fda6abd86d9d2ce9b8ea9d82b5d96defb6352d57fc611c81c0485e3179b7c76637de6d70fa254d3120934ee0bcd0d944

    • SSDEEP

      6144:KHy+bnr+sp0yN90QEKY2GJKdWoUQo9QCMBzH7NwFYRobY2aWFhUXV+feNfN8/Ju+:ZMrgy90MVPFoJ6fNwvvIXVdz8/J5hr

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks