General

  • Target

    f9d673f0ca56930a2828c55708423192178f295b5f8d91df1702c1421aad3b5e

  • Size

    431KB

  • Sample

    241111-c7ktds1enf

  • MD5

    2eb5906cb05b48766d26992b6b407cb7

  • SHA1

    3cf778520be27de0a26c2826f3ed40b19a94a980

  • SHA256

    f9d673f0ca56930a2828c55708423192178f295b5f8d91df1702c1421aad3b5e

  • SHA512

    19af20bc57e96e0c322eb8d02639e31f88256c16596e15d97357d90f7fdc0034b08490d641e89091d1c986463589e33b91b9bcddb5077d78ad4ec3d2a570d995

  • SSDEEP

    6144:K/y+bnr+jp0yN90QE1ooBH8o9+vzM8Fc5Nx61gyyQ2Ro+QHV:RMrvy908vn1gyyQWDMV

Malware Config

Extracted

Family

redline

Botnet

ramon

C2

193.233.20.23:4123

Attributes
  • auth_value

    3197576965d9513f115338c233015b40

Targets

    • Target

      f9d673f0ca56930a2828c55708423192178f295b5f8d91df1702c1421aad3b5e

    • Size

      431KB

    • MD5

      2eb5906cb05b48766d26992b6b407cb7

    • SHA1

      3cf778520be27de0a26c2826f3ed40b19a94a980

    • SHA256

      f9d673f0ca56930a2828c55708423192178f295b5f8d91df1702c1421aad3b5e

    • SHA512

      19af20bc57e96e0c322eb8d02639e31f88256c16596e15d97357d90f7fdc0034b08490d641e89091d1c986463589e33b91b9bcddb5077d78ad4ec3d2a570d995

    • SSDEEP

      6144:K/y+bnr+jp0yN90QE1ooBH8o9+vzM8Fc5Nx61gyyQ2Ro+QHV:RMrvy908vn1gyyQWDMV

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks