General

  • Target

    53d791da3135f9aedc396b3d73ee9f14986a2da02a8ab188f3695bf1ed68763a

  • Size

    442KB

  • Sample

    241111-cc8xqstjel

  • MD5

    ab4eae130df657332767dc663fa41b73

  • SHA1

    22c36d3fc26cfb3d4551e594bcba45ab432ef62a

  • SHA256

    53d791da3135f9aedc396b3d73ee9f14986a2da02a8ab188f3695bf1ed68763a

  • SHA512

    c13f6c71e5df2124c5e57b3eeeb2d0c67c48eaf4ed1b246c8a1b6653fe0d1ad34fb852e7f1ce7b1cc4547ea60c596c2a0bb3f19f520d87c17e9ec25461735108

  • SSDEEP

    6144:Kvy+bnr+up0yN90QEgBEyWzP8Hao4s+9V6odP5B/d34Rbs94mp77Lip13:BMrSy90m2yQIao4r6opPiRs94NP3

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      53d791da3135f9aedc396b3d73ee9f14986a2da02a8ab188f3695bf1ed68763a

    • Size

      442KB

    • MD5

      ab4eae130df657332767dc663fa41b73

    • SHA1

      22c36d3fc26cfb3d4551e594bcba45ab432ef62a

    • SHA256

      53d791da3135f9aedc396b3d73ee9f14986a2da02a8ab188f3695bf1ed68763a

    • SHA512

      c13f6c71e5df2124c5e57b3eeeb2d0c67c48eaf4ed1b246c8a1b6653fe0d1ad34fb852e7f1ce7b1cc4547ea60c596c2a0bb3f19f520d87c17e9ec25461735108

    • SSDEEP

      6144:Kvy+bnr+up0yN90QEgBEyWzP8Hao4s+9V6odP5B/d34Rbs94mp77Lip13:BMrSy90m2yQIao4r6opPiRs94NP3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks