General

  • Target

    8ddd7837a98c5b7622520b493a427a6a21583301ff068056eb1c13032ce3f22c

  • Size

    433KB

  • Sample

    241111-ct4dkszlcs

  • MD5

    b666e8e3e1de0c5155bfaceb961f2549

  • SHA1

    51cbcf2d571e5614c0e7444bed5f7fefaa259b07

  • SHA256

    8ddd7837a98c5b7622520b493a427a6a21583301ff068056eb1c13032ce3f22c

  • SHA512

    26da6eb62f0cc8ed0bd6760ccf65304376b29c820af48a49be047be1640267049e419fe8bdae6e9ac0016d96db9a48e0f102bacd9aedf26a37f88546a23afee0

  • SSDEEP

    6144:Kny+bnr+Rp0yN90QEjZvzD13qCSQdokvJ1R8jiMexn8kz0nXvAZz0ljVczqxYpXt:9MrFy9035zBvPudeFy/AZ1CYpXN0hK

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      8ddd7837a98c5b7622520b493a427a6a21583301ff068056eb1c13032ce3f22c

    • Size

      433KB

    • MD5

      b666e8e3e1de0c5155bfaceb961f2549

    • SHA1

      51cbcf2d571e5614c0e7444bed5f7fefaa259b07

    • SHA256

      8ddd7837a98c5b7622520b493a427a6a21583301ff068056eb1c13032ce3f22c

    • SHA512

      26da6eb62f0cc8ed0bd6760ccf65304376b29c820af48a49be047be1640267049e419fe8bdae6e9ac0016d96db9a48e0f102bacd9aedf26a37f88546a23afee0

    • SSDEEP

      6144:Kny+bnr+Rp0yN90QEjZvzD13qCSQdokvJ1R8jiMexn8kz0nXvAZz0ljVczqxYpXt:9MrFy9035zBvPudeFy/AZ1CYpXN0hK

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks