General

  • Target

    ab81491a1b4bdd256780c1ee4d967961c7c7d421f8dc379dfb55fce34d8af3c0

  • Size

    440KB

  • Sample

    241111-gn7w2atlay

  • MD5

    239007e4f7811d5593b387ca940e8326

  • SHA1

    22db6d1233a861ef331eb91f9308d6567f7bb0bb

  • SHA256

    ab81491a1b4bdd256780c1ee4d967961c7c7d421f8dc379dfb55fce34d8af3c0

  • SHA512

    a88921d222698e295be83b6b2a35a028b45e57a875a864c07cfb515ef638588a1ff0c15dd5e22ee4e50ccdb161b8a7c4fb90393ba2363af405041f6b6d998a29

  • SSDEEP

    6144:Kny+bnr+/p0yN90QENwyfkS8XvrLCeoXfjiM0PVd+jkt5y+52VXjHqsoKR5bHA:tMrHy90YCztPjiOktZ0VXjHqslbHA

Malware Config

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Targets

    • Target

      ab81491a1b4bdd256780c1ee4d967961c7c7d421f8dc379dfb55fce34d8af3c0

    • Size

      440KB

    • MD5

      239007e4f7811d5593b387ca940e8326

    • SHA1

      22db6d1233a861ef331eb91f9308d6567f7bb0bb

    • SHA256

      ab81491a1b4bdd256780c1ee4d967961c7c7d421f8dc379dfb55fce34d8af3c0

    • SHA512

      a88921d222698e295be83b6b2a35a028b45e57a875a864c07cfb515ef638588a1ff0c15dd5e22ee4e50ccdb161b8a7c4fb90393ba2363af405041f6b6d998a29

    • SSDEEP

      6144:Kny+bnr+/p0yN90QENwyfkS8XvrLCeoXfjiM0PVd+jkt5y+52VXjHqsoKR5bHA:tMrHy90YCztPjiOktZ0VXjHqslbHA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks