General

  • Target

    4f5889e0bcc94735d339cc5bfe342219bb6e81984d305ea278a60adca7a36675

  • Size

    272KB

  • Sample

    241111-ck95rstlam

  • MD5

    dd762f7c262146969cc403402f74b48c

  • SHA1

    21e6745d2d975767b57361ad78d928b447dbdb61

  • SHA256

    4f5889e0bcc94735d339cc5bfe342219bb6e81984d305ea278a60adca7a36675

  • SHA512

    776204383a8159804f917afd81893130fd9c0943ba361e322d2d192c122cf1d9be091b546b582b697dd648b3473c2bd665218d230b9afb042e7a520475017ac3

  • SSDEEP

    3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wiH:B6jodYx9cYKpzwAAh3nz

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Targets

    • Target

      4f5889e0bcc94735d339cc5bfe342219bb6e81984d305ea278a60adca7a36675

    • Size

      272KB

    • MD5

      dd762f7c262146969cc403402f74b48c

    • SHA1

      21e6745d2d975767b57361ad78d928b447dbdb61

    • SHA256

      4f5889e0bcc94735d339cc5bfe342219bb6e81984d305ea278a60adca7a36675

    • SHA512

      776204383a8159804f917afd81893130fd9c0943ba361e322d2d192c122cf1d9be091b546b582b697dd648b3473c2bd665218d230b9afb042e7a520475017ac3

    • SSDEEP

      3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wiH:B6jodYx9cYKpzwAAh3nz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks