General

  • Target

    14f423e294af0401ba7a9783c15568ceae38b4302e34caab0f17287382ddde52

  • Size

    585KB

  • Sample

    241111-cbfvkazglc

  • MD5

    f8ece9f956afd698a5445754d820a3ee

  • SHA1

    e7b69acf70f42c50a6cc0389173a4843592ece74

  • SHA256

    14f423e294af0401ba7a9783c15568ceae38b4302e34caab0f17287382ddde52

  • SHA512

    ac8d214930eeb38d1aed427649f8d660ff87cc4de5a21a6dee758909b736506d0c62856363be9b7ac95ee75505e24d505cb06aaad54350445cac328752401f21

  • SSDEEP

    12288:ZMr2y90G5sayUzTPOmEQF7T13dmVhl97cycj8:vy3GaBtfF7T13dmt97/I8

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Targets

    • Target

      14f423e294af0401ba7a9783c15568ceae38b4302e34caab0f17287382ddde52

    • Size

      585KB

    • MD5

      f8ece9f956afd698a5445754d820a3ee

    • SHA1

      e7b69acf70f42c50a6cc0389173a4843592ece74

    • SHA256

      14f423e294af0401ba7a9783c15568ceae38b4302e34caab0f17287382ddde52

    • SHA512

      ac8d214930eeb38d1aed427649f8d660ff87cc4de5a21a6dee758909b736506d0c62856363be9b7ac95ee75505e24d505cb06aaad54350445cac328752401f21

    • SSDEEP

      12288:ZMr2y90G5sayUzTPOmEQF7T13dmVhl97cycj8:vy3GaBtfF7T13dmt97/I8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks