General

  • Target

    c7c4c70180910686c9799b40504537197e79e3e28b0bdadb250c7f2a4732fc85

  • Size

    437KB

  • Sample

    241111-cmj2cs1ane

  • MD5

    1b88103925130e6a46a54be5fd28dbc0

  • SHA1

    d0373944ab2663ab42e99003415dbab34b275dd9

  • SHA256

    c7c4c70180910686c9799b40504537197e79e3e28b0bdadb250c7f2a4732fc85

  • SHA512

    407bce4d2fdc851a3ca50b30de42ddf288004c01fea7fe3c30085bf1f986c47c4f9f0bc9b537d9c6806513f3aba0acc45d27b9fe5d3a1af9b707fbee88b280d2

  • SSDEEP

    6144:K9y+bnr+Op0yN90QEoJhy8+VfE6BpNW7J4Ul6LZBfFwtxu0aUApibmurrZLXYOuU:nMrWy90VxDpY7mEABfobaUyCZ7YOIER

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Targets

    • Target

      c7c4c70180910686c9799b40504537197e79e3e28b0bdadb250c7f2a4732fc85

    • Size

      437KB

    • MD5

      1b88103925130e6a46a54be5fd28dbc0

    • SHA1

      d0373944ab2663ab42e99003415dbab34b275dd9

    • SHA256

      c7c4c70180910686c9799b40504537197e79e3e28b0bdadb250c7f2a4732fc85

    • SHA512

      407bce4d2fdc851a3ca50b30de42ddf288004c01fea7fe3c30085bf1f986c47c4f9f0bc9b537d9c6806513f3aba0acc45d27b9fe5d3a1af9b707fbee88b280d2

    • SSDEEP

      6144:K9y+bnr+Op0yN90QEoJhy8+VfE6BpNW7J4Ul6LZBfFwtxu0aUApibmurrZLXYOuU:nMrWy90VxDpY7mEABfobaUyCZ7YOIER

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks