General

  • Target

    13d79ee89845cfd7341c6fbcdf81128153e0950b90ce37fffb937ab5d0b8ed98

  • Size

    222KB

  • Sample

    241111-ckph3atkhk

  • MD5

    4c0d7a8c63e7db50078aaf966504b28f

  • SHA1

    8b15ad66aa4e580eab7771df5ce3e34feebe4baf

  • SHA256

    13d79ee89845cfd7341c6fbcdf81128153e0950b90ce37fffb937ab5d0b8ed98

  • SHA512

    20208a8917836203e141723792c31f6911327dd88028bca285986b87c29c79da3a0c2c1008f484f756f8e0c526f48c4f0d2daf1d99069230504695917c26ce4c

  • SSDEEP

    6144:IUIFKDn+N7WWkds+EKrPwd/moHLw9lXWZ7fgOWOnHH+oGP:KFM+AWkOKrK/FSq74OWO+f

Malware Config

Extracted

Family

redline

Botnet

ruzki

C2

193.106.191.165:39482

Attributes
  • auth_value

    71a0558c0eea274a5bd617ea85786884

Targets

    • Target

      8165b268caadde201f7ea049f56e8dd7ee77f80f50e44dc29fe481b15addedd3

    • Size

      276KB

    • MD5

      71fdaa64885cba62914a473afd2470e6

    • SHA1

      06ac98cd0cf0f468d80fe8f7dd6b67b13bf61a73

    • SHA256

      8165b268caadde201f7ea049f56e8dd7ee77f80f50e44dc29fe481b15addedd3

    • SHA512

      eae30de1c038f804b8f9c5625375bd378859b2f14c6b8b84955521331deaceeb4b986fa4ea0e1be49095b7706bfd09d7feaf1a4b2287ee495e5e3a45dc71bdea

    • SSDEEP

      6144:m7oRXlwn+N7WWkVs+EKrPwt/m+HLw9lXWZ8P45ORUN3:QoHw+AWkGKrw/dSq8PcOR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks