General

  • Target

    41855f8fed3914b9976db29c47628413bad748dd99b3cbc28747c1e1faea5d15

  • Size

    440KB

  • Sample

    241111-c55e1stqhr

  • MD5

    8197dc1ca5ff44b7783ed34fd2e423e5

  • SHA1

    70808c29191ed8e2e505fd6835d3a4d15a74f8c0

  • SHA256

    41855f8fed3914b9976db29c47628413bad748dd99b3cbc28747c1e1faea5d15

  • SHA512

    1d1a7acd5b8f9dca481516097790bed6364ec41bacea1a639210b0229c6e5b61ff422176f957def813515a36cf092fc9d8b7903713e7b874c7c412f2d9e8223d

  • SSDEEP

    6144:K7y+bnr+sp0yN90QEUg6WNGF1t14ByT8bUDH/MOXs6YbBstt4JXkuFc6Ze:BMrEy90+g6W8F13F/MB6uB/JXkuzZe

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      41855f8fed3914b9976db29c47628413bad748dd99b3cbc28747c1e1faea5d15

    • Size

      440KB

    • MD5

      8197dc1ca5ff44b7783ed34fd2e423e5

    • SHA1

      70808c29191ed8e2e505fd6835d3a4d15a74f8c0

    • SHA256

      41855f8fed3914b9976db29c47628413bad748dd99b3cbc28747c1e1faea5d15

    • SHA512

      1d1a7acd5b8f9dca481516097790bed6364ec41bacea1a639210b0229c6e5b61ff422176f957def813515a36cf092fc9d8b7903713e7b874c7c412f2d9e8223d

    • SSDEEP

      6144:K7y+bnr+sp0yN90QEUg6WNGF1t14ByT8bUDH/MOXs6YbBstt4JXkuFc6Ze:BMrEy90+g6W8F13F/MB6uB/JXkuzZe

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks